New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 949
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Login to check your private messagesLogin to check your private messages   LoginLogin 

Hi-Jacking-Spyware Links, Tutorials & FAQ's (05/15/04)

 
Post new topic   This topic is locked you cannot edit posts or make replies       Computer Cops Forum Index -> Hijackthis - Spyware, Viruses, Worms, Trojans Oh My!
View previous topic :: View next topic  
Author Message
phoenix22

General
General
Premium Member
Premium Member


Joined: Mar 08, 2002
Posts: 4521
Location: "DEROS"

PostPosted: Fri Oct 10, 2003 4:59 am    Post subject: Hi-Jacking-Spyware Links, Tutorials & FAQ's (05/15/04)
Reply with quote

Spybot Search and Destroy Intro

Download
Spybot - Search & Destroy v1.3
*Note: Version 1.3 is now Final

Ad-aware Intro (Lavasoft)

Ad-aware Download

Adtomi 9x CleanUp

Adtomi XP CleanUp

KillBox

SpywareBlaster

SpywareGuard

Datanotary article at SWI

HiJack This!
Create and Unzip to a folder not your Desktop or the Temp folder, doubleclick HijackThis.exe, and hit "Scan".

Peper Removal Tool

(current version)
CWShredder!

Important Note: CWS.Smartsearch is killing CWShredder, HijackThis, Spybot S&D and Ad-Aware as well as several anti-spyware sites when they are opened. I can't figure out how to make CWShredder evade this, so I'm recommending PepiMK's CoolWWWSearch.SmartKiller removal tool which you should run first. CWShredder will then run properly and cleanup the complete parasite.

CoolWWWSearch.SmartKiller



Note*Be sure to use Tony Klein's links at the bottom of this page for complete BHO Info......



Tutorials
HJT Tutorial(full)
HijackThis Log Tutorial
What's good and what's bad?

On the forums of SpywareInfo, a lot of people new to browser hijacking post topics asking for help analyzing logs from HijackThis, because they don't understand what stuff is good and what is bad.

This is a basic guide as to what the log means, and some tips on reading it yourself. This should in no way replace asking for help in the SWI forums, but help you somewhat in understanding the log yourself.
--------------------------------------------------------------------------------

Overview

Each line in a HijackThis log starts with a section name. (For technical information on this, click 'Info' in the main window and scroll down. Highlight a line and click 'More info on this item'.)

For practical information, click the section name you need help with:
R0, R1, R2, R3 - Internet Explorer Start/Search pages URLs
F0, F1 - Autoloading programs
N1, N2, N3, N4 - Netscape/Mozilla Start/Search pages URLs
O1 - Hosts file redirection
O2 - Browser Helper Objects
O3 - Internet Explorer toolbars
O4 - Autoloading programs from Registry
O5 - IE Options icon not visible in Control Panel
O6 - IE Options access restricted by Administrator
O7 - Regedit access restricted by Administrator
O8 - Extra items in IE right-click menu
O9 - Extra buttons on main IE button toolbar, or extra items in IE 'Tools' menu
O10 - Winsock hijacker
O11 - Extra group in IE 'Advanced Options' window
O12 - IE plugins
O13 - IE DefaultPrefix hijack
O14 - 'Reset Web Settings' hijack
O15 - Unwanted site in Trusted Zone
O16 - ActiveX Objects (aka Downloaded Program Files)
O17 - Lop.com domain hijackers
O18 - Extra protocols and protocol hijackers
O19 - User style sheet hijack

--------------------------------------------------------------------------------

R0, R1, R2, R3 - IE Start & Search page

What it looks like:

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page=http://www.google.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL=http://www.google.com/
R3 - Default URLSearchHook is missing
What to do:
If you recognize the URL at the end as your homepage or search engine, it's OK. If you don't, check it and have HijackThis fix it.
For the R3 items, always fix them unless it mentions a program you recognize, like Copernic.
--------------------------------------------------------------------------------

F0, F1 - Autoloading programs

What it looks like:
F0 - system.ini: Shell=Explorer.exe Openme.exe
F1 - win.ini: run=hpfsched

What to do:
The F0 items are always bad, so fix them.
The F1 items are usually very old programs that are safe, so you should find some more info on the filename to see if it's good or bad.
--------------------------------------------------------------------------------

N1, N2, N3, N4 - Netscape/Mozilla Start & Search page

What it looks like:
N1 - Netscape 4: user_pref("browser.startup.homepage", "www.google.com"); (C:\Program Files\Netscape\Users\default\prefs.js)
N2 - Netscape 6: user_pref("browser.startup.homepage", "http://www.google.com"); (C:\Documents and Settings\User\Application Data\Mozilla\Profiles\defaulto9t1tfl.slt\prefs.js)
N2 - Netscape 6: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%206%5Csearchplugins%5CSBWeb_02.src"); (C:\Documents and Settings\User\Application Data\Mozilla\Profiles\defaulto9t1tfl.slt\prefs.js)
What to do:
Usually the Netscape and Mozilla homepage and search page are safe. They rarely get hijacked. Should you see an URL you don't recognize as your homepage or search page, have HijackThis fix it.
--------------------------------------------------------------------------------

O1 - Hostsfile redirection

What it looks like:
O1 - Hosts: 216.177.73.139 auto.search.msn.com
O1 - Hosts: 216.177.73.139 search.netscape.com
O1 - Hosts: 216.177.73.139 ieautosearch
What to do:
This hijack will redirect the address to the right to the IP address to the left. If the IP does not belong to the address, you will be redirected to a wrong site everytime you enter the address. You can always have HijackThis fix these, unless you knowingly put those lines in your Hosts file.
--------------------------------------------------------------------------------

O2 - Browser Helper Objects

What it looks like:
O2 - BHO: Yahoo! Companion BHO - {13F537F0-AF09-11d6-9029-0002B31F9E59} - C:\PROGRAM FILES\YAHOO!\COMPANION\YCOMP5_0_2_4.DLL
O2 - BHO: (no name) - {1A214F62-47A7-4CA3-9D00-95A3965A8B4A} - C:\PROGRAM FILES\POPUP ELIMINATOR\AUTODISPLAY401.DLL (file missing)
O2 - BHO: MediaLoads Enhanced - {85A702BA-EA8F-4B83-AA07-07A5186ACD7E} - C:\PROGRAM FILES\MEDIALOADS ENHANCED\ME1.DLL
What to do:
If you don't directly recognize a Browser Helper Object's name, use TonyK's BHO List to find it by the class ID (CLSID, the number between curly brackets) and see if it's good or bad. In the BHO List, 'X' means spyware and 'L' means safe.

--------------------------------------------------------------------------------

O3 - IE toolbars

What it looks like:
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRAM FILES\YAHOO!\COMPANION\YCOMP5_0_2_4.DLL
O3 - Toolbar: Popup Eliminator - {86BCA93E-457B-4054-AFB0-E428DA1563E1} - C:\PROGRAM FILES\POPUP ELIMINATOR\PETOOLBAR401.DLL (file missing)
O3 - Toolbar: rzillcgthjx - {5996aaf3-5c08-44a9-ac12-1843fd03df0a} - C:\WINDOWS\APPLICATION DATA\CKSTPRLLNQUL.DLL
What to do:
If you don't directly recognize a toolbar's name, use TonyK's Toolbar List to find it by the class ID (CLSID, the number between curly brackets) and see if it's good or bad. In the Toolbar List, 'X' means spyware and 'L' means safe.
If it's not on the list and the name seems a random string of characters and the file is somewhere in a folder named 'Application Data' (like the last one in the examples above), it's definitely bad, and you should have HijackThis fix it.
--------------------------------------------------------------------------------

O4 - Autoloading programs from Registry

What it looks like:
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
What to do:
Use PacMan's Startup List to find the entry and see if it's good or bad.
--------------------------------------------------------------------------------

O5 - IE Options not visible in Control Panel

What it looks like:
O5 - control.ini: inetcpl.cpl=no
What to do:
Unless you've knowingly hidden the icon from Control Panel, have HijackThis fix it.
--------------------------------------------------------------------------------

O6 - IE Options access restricted by Administrator

What it looks like:
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
What to do:
Unless you have the Spybot S&D option 'Lock homepage from changes' active, have HijackThis fix this.
--------------------------------------------------------------------------------

O7 - Regedit access restricted by Administrator

What it looks like:
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
What to do:
Always have HijackThis fix this.
--------------------------------------------------------------------------------

O8 - Extra items in IE right-click menu

What it looks like:
O8 - Extra context menu item: &Google Search - res://C:\WINDOWS\DOWNLOADED PROGRAM FILES\GOOGLETOOLBAR_EN_1.1.68-DELEON.DLL/cmsearch.html
O8 - Extra context menu item: Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Zoom &In - C:\WINDOWS\WEB\zoomin.htm
O8 - Extra context menu item: Zoom O&ut - C:\WINDOWS\WEB\zoomout.htm
What to do:
If you don't recognize the name of the item in the right-click menu in IE, have HijackThis fix it.
--------------------------------------------------------------------------------

O9 - Extra buttons on main IE toolbar, or extra items in IE 'Tools' menu

What it looks like:
O9 - Extra button: Messenger (HKLM)
O9 - Extra 'Tools' menuitem: Messenger (HKLM)
O9 - Extra button: AIM (HKLM)
What to do:
If you don't recognize the name of the button or menuitem, have HijackThis fix it.
--------------------------------------------------------------------------------

O10 - Winsock hijackers

What it looks like:
O10 - Hijacked Internet access by New.Net
O10 - Broken Internet access because of LSP provider 'c:\progra~1\common~2\toolbar\cnmib.dll' missing
O10 - Unknown file in Winsock LSP: c:\program files\newton knows\vmain.dll
What to do:
It's best to fix these using LSPFix from Cexx.org, or Spybot S&D from Kolla.de.
--------------------------------------------------------------------------------

O11 - Extra group in IE 'Advanced Options' window

What it looks like:
O11 - Options group: [CommonName] CommonName
What to do:
The only hijacker as of now that adds its own options group to the IE Advanced Options window is CommonName. So you can always have HijackThis fix this.
--------------------------------------------------------------------------------

O12 - IE plugins

What it looks like:
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O12 - Plugin for .PDF: C:\Program Files\Internet Explorer\PLUGINS\nppdf32.dll
What to do:
Most of the time these are safe. Only OnFlow adds a plugin here that you don't want (.ofb).
--------------------------------------------------------------------------------

O13 - IE DefaultPrefix hijack

What it looks like:
O13 - DefaultPrefix: http://www.pixpox.com/cgi-bin/click.pl?url=
O13 - WWW Prefix: http://prolivation.com/cgi-bin/r.cgi?
What to do:
These are always bad. Have HijackThis fix them.
--------------------------------------------------------------------------------

O14 - 'Reset Web Settings' hijack

What it looks like:
O14 - IERESET.INF: START_PAGE_URL=http://www.searchalot.com
What to do:
If the URL is not the provider of your computer or your ISP, have HijackThis fix it.
--------------------------------------------------------------------------------

O15 - Unwanted site in Trusted Zone

What it looks like:
O15 - Trusted Zone: http://free.aol.com
What to do:
So far, only AOL has the tendency to add itself to your Trusted Zone, allowing it to run any ActiveX it wants. Always have HijackThis fix this.
--------------------------------------------------------------------------------

O16 - ActiveX Objects (aka Downloaded Program Files)

What it looks like:
O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/...1/chat.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://download.macromedia.com/pub/shoc...wflash.cab
What to do:
If you don't recognize the name of the object, or the URL it was downloaded from, have HijackThis fix it. If the name or URL contains words like 'dialer', 'casino', 'free_plugin' etc, definitely fix it.
--------------------------------------------------------------------------------

O17 - Lop.com domain hijacks

What it looks like:
O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = aoldsl.net
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = W21944.find-quick.com
O17 - HKLM\Software\..\Telephony: DomainName = W21944.find-quick.com
O17 - HKLM\System\CCS\Services\Tcpip\..\{D196AB38-4D1F-45C1-9108-46D367F19F7E}: Domain = W21944.find-quick.com
What to do:
If the domain is not from your ISP or company network, have HijackThis fix it.
--------------------------------------------------------------------------------

O18 - Extra protocols and protocol hijackers

What it looks like:
O18 - Protocol: relatedlinks - {5AB65DD4-01FB-44D5-9537-3767AB80F790} - C:\PROGRA~1\COMMON~1\MSIETS\msielink.dll
O18 - Protocol: mctp - {d7b95390-b1c5-11d0-b111-0080c712fe82}
O18 - Protocol hijack: http - {66993893-61B8-47DC-B10D-21E0C86DD9C8}
What to do:
Only a few hijackers show up here. The known baddies are 'cn' (CommonName), 'ayb' (Lop.com) and 'relatedlinks' (Huntbar), you should have HijackThis fix those.
Other things that show up are either not confirmed safe yet, or are hijacked by spyware. In the last case, have HijackThis fix it.
--------------------------------------------------------------------------------

O19 - User style sheet hijack

What it looks like:
O19 - User style sheet: c:\WINDOWS\Java\my.css
What to do:
In the case of a browser slowdown and frequent popups, have HijackThis fix this item if it shows up in the log.
--------------------------------------------------------------------------------

If something in your log still puzzles you after this short tutorial, there is nothing stopping you from posting at the SpywareInfo forums.


--------------------------------------------------------------------------------
If you have any problems, questions or comments concerning this document, you can email me if you like.
Merijn ,

SpyBot Search and Destroy Home Page
SpyBot tutorial

Getting Started

Spybot Search and Destroy is a Spyware Remover first. There are more features which will be covered later. This introduction will include instructions on how to install and run a Spyware Only Check and Remove what has been found.

To install the program, double click on the Downloaded file (spybotsd12.exe). Follow the prompts to install. If your native language is English, there is no need to install the Language files. If not, please do.

Once Spybot has been installed, it will run a Wizard to help get you Set up. You can choose the Language you want to use, create shortcuts and most importantly Update the program. Just like Anti Virus, Spyware killers have to constantly be updated. New Spyware is being written everyday. Keeping up with it is as important as installing Spybot was in the first place. Please keep Spybot Updated to have the most effective protection possible whenever you run a scan.


CCSP CLSID Infolist
CLSID & BHO Info List

These are also great for identifying running processes
Start-Up Applications
Pacs Portal aka Start-Up applications:
http://www.sysinfo.org/startuplist.php

Task List Programs
http://www.answersthatwork.com/Tasklist_pages/tasklist.htm


Last edited by phoenix22 on Sat May 15, 2004 12:04 pm, edited 7 times in total
Back to top
View users profile Send private message Visit posters website
phoenix22

General
General
Premium Member
Premium Member


Joined: Mar 08, 2002
Posts: 4521
Location: "DEROS"

PostPosted: Fri Jan 30, 2004 12:55 pm    Post subject: Merijn's FAQ's(the developer of HiJack This-CWShredder)
Reply with quote

http://www.merijn.org/faq.html
Questions related to CoolWebSearch

Q. What is your connection to cool-search.net?
None. I did not create cool-search.net or the trojan that is hijacking you to it. Since I help people remove this trojan from systems, the people behind cool-search.net obviously don't like me and try to discredit me by attempting to make it seem as I am to blame for this trojan.
If you believe this, think for a second about the fact that I don't charge you a dime for using CWShredder.

Q. What is your connection to searchvph.com?
None. I did not create searchvph.com or the trojan that is hijacking you to it. Since I help people remove this trojan from systems, the people behind cool-search.net obviously don't like me and try to discredit me by attempting to make it seem as I am to blame for this trojan.

Q. What is your connection to CoolWebSearch?
None. I only maintain a tool dedicated to removing the flood of trojans that seems to flow from one origin: CoolWebSearch.com.

Q. Who is/are CoolWebSearch?
Coolwebsearch is a company located in Russia. From their site:
Cool Web Search is a Pay-Per-Click search engine. [..] If you get a lot of visitors on your website, we will pay you 50% for each search, that your visitors make on our search engine. We also will pay you 5% of the revenues earned by every webmaster you referred to us.
Since their emergence last year they have accumulated over 1000 affiliates, all with their own site.
We know the following people are running/working for CoolWebSearch:
Louise (founder)
Alex Bolshesvik (programming)
Serge Stepantsov (programming)
Victor (site admin)

Q. How can I contact CoolWebSearch?
Here: http://www.coolwebsearch.com/contact.html

Q. How do I get rid of this CWS trojan?
You can use my tool, the Cool Web Shredder aka CWShredder:
http://www.merijn.org/cwschronicles.html#cwshredder

Q. I don't want to use your tool. How do I get rid of this CWS trojan?
Removing the CWS trojan manually is very hard. You can try using my CWS Chronicles to guide you, but you have to know a fair bit about Windows to be able to do it.

Q. How can I do something to combat this CWS trojan?
Lookup the domain you were hijacked to (or any domain affiliated with CWS) and complain to their registrar or upstream provider. Several domains already have been shutdown by doing this.



Questions related to CWShredder

Q. Why can't I download CWShredder, the link is not working!
The link is kept updated at all times. You may be blocked by the CWS trojan on your system. Go to this mirror of my site: http://216.180.233.153/~merijn/index.html and try to download there.

Q. Why am I getting an 'Unexpected error' about a missing DLL when running CWShredder?
You need the Visual Basic Runtime Libraries to be able to run CWShredder. Most recent Windows have these installed by default, but if you don't have these files, they're available from Microsoft.com.

Q. Your CWShredder program doesn't fix my problem!
You may have an old version of CWShredder. Use the 'Check for updates' function to see if a newer version is available and see if that can remove your problem.
If it still doesn't fix it, download HijackThis and post a scan log on the SpywareInfo forums, asking for help.

Q. How do I prevent CWS from infecting me again?
Keep your system up to date from WindowsUpdate! This is the first step in armoring your system. The variants of the CWS trojan all install through old exploits in IE. Secondly, disabling Java might be a good idea since there have been reports of infections even on fully patched systems.
For more help on protecting yourself, check out this thread at Net-Integration.net.

Q. Why is CWShredder closing suddenly when I run it?
The latest variant of CWS, CWS.Smartsearch.2, is attempting to close CWShredder, HijackThis, Spybot S&D, Ad-aware and a handful of online help forums when you try to open them. To counter this, CWShredder has been updated. Start it again when it suddenly closes and it should work. If it still doesn't work, download PepiMK's CoolWWWSearch.Smartsearch killer and run that first, then use CWShredder to clean up.

Q. I think I have a new variant, it's not in your CWS Chronicles and CWShredder isn't removing it.
First, check if you have the latest version of CWShredder. If you do, please Contact me and describe the hijack to me in as much detail as you possibly can. If you include a HijackThis log you would help me even more. Thanks!



Questions related to HijackThis

Q. Why am I getting an 'Unexpected error' about a missing DLL when running HijackThis?
You need the Visual Basic Runtime Libraries to be able to run HijackThis. Most recent Windows have these installed by default, but if you don't have them, they're available from Microsoft.com.

Q: How do I know what to remove and what not in the scan results?
Ask someone who knows. You're not expected to understand all the results. You can post your log on one of the online help forums and ask for help.

Q: I removed the browser hijack but it keeps coming back!
You probably left something behind that is reloading the hijack or there is something else present on your system reloading it that isn't visible in HijackThis. In both cases, post your log on one of the online help forums and ask for help.

Q: Why is HijackThis closing suddenly when I run it?
The latest variant of CWS, CWS.Smartsearch.2, is attempting to close CWShredder, HijackThis, Spybot S&D, Ad-aware and a handful of online help forums when you try to open them. Download PepiMK's CoolWWWSearch.Smartsearch killer and run that first, then you can use Hijackthis. It is recommended you use CWShredder as well to clean up the CWS.Smartsearch trojan.

Q: Why is x not shown in the scan results from HijackThis? I know a trojan/virus that uses this method to start.
HijackThis targets only browser hijacking methods, not trojans or viruses. Possibly the startup method you mean is showed by StartupList. If multiple browser hijackers are known to use a startup method, it is included in HijackThis.


Merijn.org
Back to top
View users profile Send private message Visit posters website
Display posts from previous:   
Post new topic   This topic is locked you cannot edit posts or make replies       Computer Cops Forum Index -> Hijackthis - Spyware, Viruses, Worms, Trojans Oh My! All times are GMT - 5 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB 2.0.8a © 2001 phpBB Group

Version 2.0.6 of PHP-Nuke Port by Tom Nitzschner © 2002 www.toms-home.com
Version 2.2 by Paul Laudanski © 2003-2004 Computer Cops