Google Answers Logo
View Question
 
Q: uninstalling a web site viewer ( Answered 5 out of 5 stars,   3 Comments )
Question  
Subject: uninstalling a web site viewer
Category: Computers > Software
Asked by: mountaindriv-ga
List Price: $20.00
Posted: 15 Oct 2004 12:26 PDT
Expires: 14 Nov 2004 11:26 PST
Question ID: 415411
My son visited a porno site. The site installed a web site viewer on
to the computer. Little did he know that even if you try to delete it,
it comes back up after every reboot. I need to get this off the
computer. In the file folder there is are two files the first is
125021.ban and the second is 125021.dlr. These were installed in a
folder called website viewer under c:program files. When you click on
c drive there is an exe program attached to it named 125021.exe. I
have tried to locate it in the add/remove but have had no luck. Teh
company name is smooth content Ltd. Any help would be greatly
appreciated.
Answer  
Subject: Re: uninstalling a web site viewer
Answered By: livioflores-ga on 15 Oct 2004 22:25 PDT
Rated:5 out of 5 stars
 
Hi mountaindriv!!

To get rid from this pestware I suggest you to try first with Adaware,
download it and update it before scanning:
You can download it from:
http://downloads.planetmirror.com/pub/majorgeeks/spyware/aawsepersonal.exe
or
http://www.majorgeeks.com/download506.html


If you don't know how to use it, here is a guide for Adaware:
"Ad-aware Tutorial":
http://www.fluteloop.com/Adaware6.htm

The suggested settings for a succesful scan with Adaware are: (click
on the Configuration button)

-Under Scanning check the following items: 
Scan within archives 
Scan active processes
Scan registry
Deep-scan registry
Scan my IE Favourites for banned URL's
Scan my host's file 

-Tweaks:
·Under Scanning engine settings, please check:
"Unload recognised processes during scanning"
·Under Cleaning engine, please check:
"Always try to unload modules before deletion"
"Let Windows remove files in use at next reboot"


Remove what it finds by placing a check in the box to the left of the
object or use the select all feature and then reboot the PC.

If this doesn't work please download and run HijackThis and post the
log without fixing anything using the clarification feature. I will
indicate you which things must be fixed.
To download the last version of HijackThis:
http://www.majorgeeks.com/download3155.html

Here are two quick guides that will help you to use it and will show
you how to generate the log:
"HijackThis Quick Start":
http://s89223352.onlinehome.us/mirror/hjt/

"HijackThis Tutorial": (more complete one)
http://www.bleepingcomputer.com/forums/index.php?showtutorial=42

At the last page please read the "How to use HijackThis" section:
Here you will learn to scan and generate the log and how to post it also.
http://www.bleepingcomputer.com/forums/index.php?showtutorial=42#HowToUse


Please if you use HijacckThis I suggest you to don't fix anything if
you are not sure of what is that, you can compromise the Windows
system if you delete something that must not be fixed. Just post the
log and I will indicate you what must be fixed.

As an example of the use and utility of HijackThis, see the following
thread in which a PESTware like the one installed in your PC was
removed. Note that the same problem shows some difference from one
system to other, so I suggest you to use the following link as an
example just to SEE how a similar trouble can be fixed, not as an step
by step guide.
"SWI Forums > Smooth Content Porn Dialer Won't Die!":
http://forums.spywareinfo.com/lofiversion/index.php/t28284.html


I hope that this helps you. Feel free to request for further
assistance if it needed.


Best regards.
livioflores-ga

Request for Answer Clarification by mountaindriv-ga on 16 Oct 2004 07:51 PDT
Logfile of HijackThis v1.98.2
Scan saved at 10:48:49 AM, on 10/16/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Norton AntiVirus\SAVScan.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\HP\Digital Imaging\Unload\hpqcmon.exe
C:\Program Files\HP\HP Share-to-Web\hpgs2wnd.exe
C:\WINDOWS\System32\hphmon05.exe
C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\progra~1\scansoft\paperp~1\pptd40nt.exe
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb09.exe
C:\WINDOWS\System32\systime.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\NetZero\exec.exe
C:\WINDOWS\System\MSMSGSVC.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\systime.exe
C:\Documents and Settings\Devon\Application Data\amee.exe
C:\WINDOWS\System32\t?skmgr.exe
C:\Program Files\POP Peeper\POPPeeper.exe
C:\WINDOWS\System32\HPZipm12.exe
C:\Program Files\HP\HP Share-to-Web\hpgs2wnf.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\System32\msiexec.exe
C:\Program Files\Hewlett-Packard\HP Software Update\hpwuSchd2.exe
C:\Program Files\Highjack this\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://213.159.117.134/index.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://213.159.117.134/index.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://213.159.117.134/index.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
http://213.159.117.134/index.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\SearchURL,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
http://213.159.117.134/index.php
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
http://213.159.117.134/index.php
R3 - URLSearchHook: (no name) - _{37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - (no file)
O2 - BHO: DOMPeek Class - {834261E1-DD97-4177-853B-C907E5D5BD6E} -
C:\WINDOWS\dpe.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -
C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: HP View - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} -
C:\Program Files\HP\Digital Imaging\bin\hpdtlk02.dll
O3 - Toolbar: Norton AntiVirus -
{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton
AntiVirus\NavShExt.dll
O3 - Toolbar: ZeroBar - {F5735C15-1FB2-41FE-BA12-242757E69DDE} -
C:\Program Files\NetZero\Toolbar.dll
O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} -
C:\Program Files\NetZero\toolbar.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE
C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch
Buttons\EabServr.exe /Start
O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common
Files\Sonic\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [CamMonitor] C:\Program Files\HP\Digital
Imaging\Unload\hpqcmon.exe
O4 - HKLM\..\Run: [Share-to-Web Namespace Daemon] C:\Program
Files\HP\HP Share-to-Web\hpgs2wnd.exe
O4 - HKLM\..\Run: [HPHUPD05] c:\Program
Files\HP\{45B6180B-DCAB-4093-8EE8-6164457517F0}\hphupd05.exe
O4 - HKLM\..\Run: [HPHmon05] C:\WINDOWS\System32\hphmon05.exe
O4 - HKLM\..\Run: [mmtask] c:\Program Files\MusicMatch\MusicMatch
Jukebox\mmtask.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [PaperPort PTD] c:\progra~1\scansoft\paperp~1\pptd40nt.exe
O4 - HKLM\..\Run: [MMTray] C:\Program Files\MUSICMATCH\MUSICMATCH
Jukebox\mm_tray.exe
O4 - HKLM\..\Run: [HPDJ Taskbar Utility]
C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb09.exe
O4 - HKLM\..\Run: [SAClient] "C:\Program
Files\Insight\BBClient\Programs\RegCon.exe" /admincheck
O4 - HKLM\..\Run: [SysTime] C:\WINDOWS\System32\systime.exe
O4 - HKLM\..\Run: [Spyware Stormer] C:\Program Files\Spyware
Stormer\SpywareStormer.Exe
O4 - HKLM\..\Run: [Windows SyncroAd] C:\Program Files\Windows SyncroAd\SyncroAd.exe
O4 - HKLM\..\Run: [HP Software Update] "C:\Program
Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program
Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [MoneyAgent] "c:\Program Files\Microsoft
Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [spc_w] "C:\Program Files\NZSearch\hcm.exe" -w
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [BackupNotify] C:\Program Files\HP\Digital
Imaging\bin\backupnotify.exe
O4 - HKCU\..\Run: [NetZero_uoltray] C:\Program Files\NetZero\exec.exe regrun
O4 - HKCU\..\Run: [MSMsgSvc] C:\WINDOWS\System\MSMSGSVC.exe
O4 - HKCU\..\Run: [SysTime] C:\WINDOWS\System32\systime.exe
O4 - HKCU\..\Run: [Aaou] C:\Documents and Settings\Devon\Application Data\amee.exe
O4 - HKCU\..\Run: [Pyemj] C:\WINDOWS\System32\t?skmgr.exe
O4 - HKCU\..\Run: [POP Peeper] "C:\Program Files\POP Peeper\POPPeeper.exe" -min
O4 - Startup: ePrompter.lnk = C:\Program Files\ePrompter\ePrompter.exe
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Startup: PowerReg Scheduler.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program
Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program
Files\Quicken\bagent.exe
O8 - Extra context menu item: Display All Images with Full Quality -
res://C:\Program Files\NetZero\qsacc\appres.dll/228
O8 - Extra context menu item: Display Image with Full Quality -
res://C:\Program Files\NetZero\qsacc\appres.dll/227
O8 - Extra context menu item: E&xport to Microsoft Excel -
res://C:\PROGRA~1\MI1933~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
O9 - Extra 'Tools' menuitem: Sun Java Console -
{08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} -
C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
O13 - DefaultPrefix: http://%65%68%74%74%70%2E%63%63/?
O13 - WWW Prefix: http://%65%68%74%74%70%2E%63%63/?
O14 - IERESET.INF: START_PAGE_URL=http://www.insightbb.com
O15 - Trusted Zone: *.skoobidoo.com
O15 - Trusted Zone: *.windupdates.com
O16 - DPF: {00708EF3-C265-6E2B-AC44-149025F9B1DB} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {021DFDFD-3902-0736-FD70-658009335FE7} -
http://213.159.117.150/1/gdnUS10.exe
O16 - DPF: {0378C443-78D8-1DE6-29C2-64F36652C2CA} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {047DD49A-4232-4DD4-8867-3CEC3DEA631C} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {050CFBC8-A961-00B7-89BE-03FB4F1B1CDE} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {05E4186B-9CE5-4F51-1442-5B4567D9A003} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {07571BF8-E7C4-5A28-8B21-151D3B3C6910} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {07B3BA4A-4A8A-3A23-C2D0-71812351A4FD} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {08AC2F38-2361-5E9A-06B0-52D55B58B0E1} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {08B52773-CD29-0CA6-8DFB-08C83C0EF201} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {09FA63D0-2C56-775E-3B63-062E36909F4A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {0B8115ED-B59F-276A-A5F9-7465202959C9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {0C49AAF7-F08E-35C8-16CE-076C2DEF1B6F} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {0C853236-6D59-4AE3-A319-72D636CCEB1A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {0DE6FE3B-92E6-038A-EABF-22082CF5C13C} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {0E99C086-5692-4E16-6510-3C75093D9035} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {149660A8-F72A-69DD-19BE-5E1435AB246F} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {1A877478-B9B9-0EA7-92EA-328960EEE2C1} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {1BA2EF06-8E1F-3C7C-8067-0CD00D5CCA02} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {1E655F8D-78E7-6000-D4AE-335C1FE0083C} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {1F28284E-91CD-6DF7-1307-25B60E5089F3} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {1FE3A39A-062A-3300-76A7-6EAE061D0093} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {1FF892A9-F53D-128C-AE78-0F3E1730EB40} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {20713ADF-820B-55D1-7576-198E1CB22DDA} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {20EE038C-C24D-0505-5CE7-7AD42A5D3B71} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {21423703-01F2-4B5B-88A5-58C654DD934A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {21C98D47-3803-40CA-EE30-59DF0999AFBF} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {22516B95-A6A3-4C55-0D27-287F3DF28038} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {239FF718-14A5-56EA-30E8-451E72F87D3A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {26F2CE2B-8219-295E-C6BF-0FA36D2F76EC} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {26F8B03A-0834-30B9-30C9-1582273AD6BC} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {276BB005-C4A8-0463-86CA-1ACC67F80585} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {2947A2D1-D171-1544-0A3A-53A5587CF596} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {29B4491A-F8EB-6F79-AA9A-34A32CF1A1D9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {2ADCC27B-3C3C-659C-2DEC-7F1313DDE61E} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {2BBACD14-A8B2-4316-403B-5CA64D595E4F} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {2EB1AE73-88AB-6141-49B2-278F6E5D7EC3} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {2F0A105A-997B-6DB1-C63D-678D62700A26} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {2F635E1F-EC0C-11FE-0DB9-11944078A632} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3014789B-8E94-4A53-4252-70DF630369A7} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {30377B2E-67BF-468C-DC95-56693862544F} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {34C703B4-A55E-512F-243E-6C041D1BD7E3} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {38511250-E428-7E2F-7B61-280C220F426A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {38B3C73B-B344-1C50-DE00-11154FAE9CDA} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {38BCBC3D-FE46-4FD5-A920-7CF64FF5F0D9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {39C6A5B0-B05B-6FDE-9DF9-2F421C83C8A2} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3A88EDDF-3D39-65A6-5B72-670000262AF0} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3B5D50A9-2793-3F49-B3C9-6DDC16811395} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3B792673-7CD8-1DFE-9414-41777E8E11AA} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3D9E5B62-B96F-4EF8-3513-0D5D7AF4C881} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3DB88AF8-8DE1-697C-3EBA-795F62B5CF8C} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {3F063A69-232C-4EFF-D181-0C624666281A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {40CB8A33-F9BD-15A3-D9B3-7C636CC545AB} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {413A4B65-B2FE-0EF1-19BB-264B3702E283} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {41E0484E-E307-2645-A93B-6E3867EB9F40} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4221A873-7814-775E-5941-2BD5284BA65E} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {426A99AF-6520-479E-1A04-0D8159B51AE9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {43CC9315-F0AC-2E8F-9A3D-57521A03C2CF} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {45251F8C-7FEB-05E1-9DB2-019E6EC6B3A1} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4761327C-E2C2-5E9F-DD84-38274D52F223} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {48072E07-1379-7C5F-AB1E-77813E039066} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4897A33A-6E26-42A4-E982-1F9D37E1F787} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {48D0595C-B6F0-29BB-21D5-01E92268F6B4} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4A68B53E-D96B-0C01-013B-1D053C954CEA} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4B4DE094-59AD-3BEF-E7C7-1F474AA5FDF9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4C4DCD15-650E-7904-3B90-299A0E1E5268} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4CD50441-56DF-35E0-D4B6-66A216831AFB} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4D1B7C25-EC61-0835-9D8A-3E0C62F7BB3B} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {4DB870C4-EF2E-1D65-7E6A-311F21F92872} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {51455DEC-7BB4-7017-EDAB-45E469F226C9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {51940D8D-52C2-6F5A-41B6-2C925120BF6A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {535F1957-4CEE-23E8-03F6-5E0027407CD4} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {54215A78-B28C-26F3-6A42-0D911D5F7013} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {57785AC5-3270-72ED-3836-6DE318CED3EC} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {58206345-4480-09A0-7A8C-0A1E3F1F356C} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {58B7123F-017B-25C8-20F8-213913629AD7} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {5A535DFF-BFDD-33D0-76EF-14F22E30F0FF} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {5A618DDC-5058-0D87-C305-37CE2B42B6A6} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {5AEC5194-EB16-719F-24B7-2C7572E74F16} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {604F02ED-6495-026E-B007-22EE52DFEF1B} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {60953EDF-8B2A-6AD6-21A8-210C128DE6E2} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6507EA6F-D40C-4050-B63B-6D7902CCA112} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6717247F-AE06-57D2-0012-1A0C5DEEB072} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {686B0660-7664-6AC2-A153-0E492652B5E4} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {694F9CF1-076B-72A8-6A83-70433D047DAE} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {69D79F61-D67E-38D4-0C60-78337C4224A0} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6A98C5DF-DC8D-6F1A-23CD-2EA6150CF6A3} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6CC9FCC5-4CC0-75D8-4F76-40E65C85EBD9} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6E2ECE6C-C701-0626-FB99-4EB94CCE1E9B} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6E37B7C7-F6E2-0BB0-27C0-7D8504992907} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {6EBF2062-8347-5C02-46D5-476D08F74C9F} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {70C5A5EB-0395-2656-0E09-457163D9C9BD} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {71651977-490A-52C9-8C8B-70A91BDCEE41} -
http://213.159.117.150/1/gdnUS10.exe
O16 - DPF: {7271A289-7CE8-5A10-B6F9-2A403168F08E} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {764BD591-ACBE-32C0-0F39-7C7D08160328} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {7778480D-EB3F-6013-EF29-63400CAC6547} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {77C62244-34CB-2F64-BFD2-0E5A7F499028} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {78F38B30-376A-73EE-1393-6A1F33259FBE} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {796780F3-8EAA-6838-3E1A-547C79EFB621} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {7C384F0B-B519-14C6-B0C7-4AB149584860} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {7CC124B6-C5D0-18D3-F02A-596A4EA24D0A} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {7D26DD62-01BF-2F1A-6187-0A06420997AA} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {7DCAC57B-E558-1EB3-02C3-56631730CC7C} -
http://213.159.117.150/1/rdgUS10.exe
O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} (InstallShield
International Setup Player) -
http://www.lizardtech.com/software/expressview/webinstall/isetup.cab
O16 - DPF: {9CCE3B43-4DE0-4236-A84E-108CA848EE6A} (WebCam Control) -
http://webcamnow.com/broadcast/ActiveXWebCam.cab

Clarification of Answer by livioflores-ga on 16 Oct 2004 22:30 PDT
Hi!!

Wow!! Your system is plenty of spyware and other pests. Did you use
Adaware? If not give it a chance. I notice that you have installed
Spyware Stormer, this software is considered a bad one of this type,
so I suggest you to uninstall it and use Adaware (it is one of the
better and it is free). Spyware Stormer is suspected of act as an
spyware. See the following costumers' reviews:
"Spyware Stormer - User opinions and free download at Download.com":
http://www.download.com/3302-8022_4-10297449.html


Print these instructions in order to read them while you are cleaning your PC.

Uninstall Windows SyncroAd from Control Panel --> Add/Remove Software.
(if you cannot uninstall it don't worry, continue with the rest of the
instructions)

Perform an online antivirus scan at HouseCall:
Click on the "Scan Now. It's Free!" link and accept all the required
downloads and temporary installs. 
http://housecall.trendmicro.com/

Remove found trojans and viruses (if any) and then reboot.
Now download and run CWShredder to remove the CoolWebSearch spyware:
http://www.majorgeeks.com/download4086.html

Reboot your computer and run Adaware, let it fix every thing that it
found and reboot again.

Now copy HijackThis into its own folder:
Click My Computer --> then C:\ --> At menu bar: File->New->Folder -->
A folder named New Folder will be created, rename it to HJT to have a
C:\HJT\ folder --> Move HijackThis there. HijackThis makes backups of
everything you fix, these backups will be saved in the same folder the
program is.

Now run HijackThis, scan and check the following items (DON'T FIX YET):
If you have run Adaware and CWShredder before run HJT some of the
following entries will not be found (and this is a good new!!).

All the R0 and R1 section:
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://213.159.117.134/index.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://213.159.117.134/index.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://213.159.117.134/index.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
http://213.159.117.134/index.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch
= http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R1 - HKLM\Software\Microsoft\Internet Explorer\SearchURL,(Default) =
http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
http://213.159.117.134/index.php
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
http://213.159.117.134/index.php

R3 - URLSearchHook: (no name) - _{37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - (no file)

O2 - BHO: DOMPeek Class - {834261E1-DD97-4177-853B-C907E5D5BD6E} -
C:\WINDOWS\dpe.dll

O4 - HKLM\..\Run: [SysTime] C:\WINDOWS\System32\systime.exe
O4 - HKLM\..\Run: [Spyware Stormer] C:\Program Files\Spyware
Stormer\SpywareStormer.Exe (this one only if you want to disable it -suggested-)
O4 - HKLM\..\Run: [Windows SyncroAd] C:\Program Files\Windows SyncroAd\SyncroAd.exe
O4 - HKCU\..\Run: [SysTime] C:\WINDOWS\System32\systime.exe
O4 - HKCU\..\Run: [Aaou] C:\Documents and Settings\Devon\Application Data\amee.exe
O4 - HKCU\..\Run: [Pyemj] C:\WINDOWS\System32\t?skmgr.exe
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Startup: PowerReg Scheduler.exe

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
O9 - Extra 'Tools' menuitem: Sun Java Console -
{08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)

O13 - DefaultPrefix: http://%65%68%74%74%70%2E%63%63/?
O13 - WWW Prefix: http://%65%68%74%74%70%2E%63%63/?

O14 - IERESET.INF: START_PAGE_URL=http://www.insightbb.com

O15 - Trusted Zone: *.skoobidoo.com
O15 - Trusted Zone: *.windupdates.com

The complete O16 section.


Now close all open browsers and windows and Click 'Fix Checked'. 
Reboot into Safe Mode:
"Starting your computer in Safe mode":
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_nam

Run Hijack this, go to Config > Misc Tools > Open process manager. 
Select the following processes one at a time and click "Kill Process".
Do not worry if they are not all listed:

C:\WINDOWS\System32\systime.exe
C:\Program Files\Spyware Stormer\SpywareStormer.Exe (this one only if
you want to disable it -suggested-)
C:\Program Files\Windows SyncroAd\SyncroAd.exe
C:\WINDOWS\System32\systime.exe
C:\Documents and Settings\Devon\Application Data\amee.exe
C:\WINDOWS\System32\t?skmgr.exe
PowerReg Scheduler V3.exe
PowerReg Scheduler.exe

Display hidden files, file extensions and folders: 
Go to Start --> Run  --> Type 'control folders' (w/o quotes) and press
enter --> On the displayed box go to the View tab --> Check "Show
hidden files and folders" --> Uncheck "Hide protected Operating System
files" and "Hide file extensions..." --> Click Apply to all folders
button --> Accept.
See "How to Show System Files":
http://www.xtra.co.nz/help/0,,4155-1916458,00.html

Open an Explorer window and surf your computer to delete the following files: 
·C:\WINDOWS\dpe.dll
·C:\WINDOWS\System32\systime.exe
·C:\Program Files\Spyware Stormer\SpywareStormer.Exe (this one only if
you want to disable it -suggested-)
·C:\Program Files\Windows SyncroAd\SyncroAd.exe
·C:\WINDOWS\System32\systime.exe
·C:\Documents and Settings\Devon\Application Data\amee.exe
·C:\WINDOWS\System32\t?skmgr.exe  ,here try to find any file that
matches this pattern and delete it: for example tqskmgr.exe . Any file
except taskmgr.exe
·PowerReg Scheduler V3.exe
·PowerReg Scheduler.exe
 

Clear Temporary Folders\Files and Internet Files 
Go to start --> Run --> Type cleanmgr --> Enter. 

Make sure only the following are checked: 
·Temporary Internet files 
·Recycle Bin 
·Temporary Files 

Click OK 
Repeat the steps for clearing temporary folders\files and internet
files for all users.

Disable System Restore: 
Right Click on "My Computer" at desktop --> Select Properties --> Go
to the System Restore Tab --> Check 'Turn off System Restore on all
drives' --> Click Apply --> Unckeck 'Turn off System Restore on all
drives' --> Accept.

Reboot in normal mode (as always), run HijackThis, scan and post the new log. 
I hope that the new log will be a clean one.


Regards.
livioflores-ga
mountaindriv-ga rated this answer:5 out of 5 stars and gave an additional tip of: $10.00
after the process my ie wouldn't work correctly. logged on this
morning and everything is okay. Thanks livioflores-ga.

Comments  
Subject: Re: uninstalling a web site viewer
From: vballguy-ga on 15 Oct 2004 12:50 PDT
 
I am not sure if this will work, but it is worth a shot.

1) Reboot in safe mode  
2) Check your system.ini, and registry for this application and delete
all references.
3) Delete the program and directory.
4) Reboot.

While doing this, make sure your computer isn't hooked to a phone cord
or it could call out (the .dlr is typically a dialer that can make
expensive calls).
Subject: Re: uninstalling a web site viewer
From: wizardnj-ga on 15 Oct 2004 13:13 PDT
 
I'd download and use BOTH Ad-Aware and Spybot-S&D.  One or both should
zap it totally.
Subject: Re: uninstalling a web site viewer
From: livioflores-ga on 18 Oct 2004 20:40 PDT
 
Hi!!

Thank you mountaindriv for the good rate and the generous tip!!

I am really glad to see that your problem was solved, and as a way to
say thank you I will post a link that will give you some advices about
how to avoid getting pestwares:
"KRC Anti-Spyware Tutorial":
http://www.greyknight17.com/spyware.htm


My suggested programs for prevention:
PestPatrol (shareware $39.95):
This is the one that I use in my computer and it is perfect for this purpose.
http://www.pestpatrol.com/Products/PestPatrolHE/


SpywareBlaster (freeware):
·Prevent the installation of ActiveX-based unwanted pests. 
·Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. 
·Restrict the actions of potentially dangerous sites in Internet Explorer.
http://www.javacoolsoftware.com/spywareblaster.html

SpywareGuard (freeware): (it is not recommended to use together with PestPatrol)
Provides a real-time protection solution against spyware that is a
great addition to SpywareBlaster's protection method.
http://www.javacoolsoftware.com/spywareguard.html


Best regards.
livioflores-ga

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy