Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Work Computer Has Mutiple Popup Programs


  • Please log in to reply
3 replies to this topic

#1 j1718

j1718

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:07 AM

Posted 12 June 2006 - 01:14 PM

Help me,

My work laptop has multiple programs causing pop ups and I cant get anything done. I know it has zeno and elite media group. But I am not sure what else it has. I am running windows 2000. Here is my log


Logfile of HijackThis v1.99.1
Scan saved at 1:50:21 PM, on 6/12/2006
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\System32\SCardSvr.exe
C:\WINNT\system32\nslsvice.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\AccessManager\Client\AMBroker.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\hidserv.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\mcshield.exe
C:\Program Files\Network Associates\VirusScan\vstskmgr.exe
C:\Notes\ntmulti.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\Program Files\AccessManager\PMAC\sp_SWIns.exe
C:\Program Files\CheckPoint\SecuRemote\bin\SR_Service.exe
C:\Program Files\CheckPoint\SecuRemote\bin\SR_WatchDog.exe
C:\WINNT\system32\stisvc.exe
C:\Program Files\AccessManager\Client\sygman.exe
C:\WINNT\system32\WFXSVC.EXE
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\Program Files\Symantec\WinFax\WFXMOD32.EXE
C:\WINNT\system32\svchost.exe
C:\WINNT\MS\SMS\CLICOMP\RemCtrl\Wuser32.exe
C:\WINNT\MS\SMS\clicomp\apa\Bin\smsapm32.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\Program Files\CheckPoint\SecuRemote\bin\SR_GUI.Exe
C:\WINNT\system32\PRPCUI.exe
C:\WINNT\system32\mobsync.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINNT\system32\DSentry.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\WINNT\system32\wfxsnt40.exe
C:\WINNT\MS\SMS\CORE\BIN\LAUNCH32.EXE
C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe
C:\Program Files\Common Files\Network Associates\TalkBack\tbmon.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Microsoft IntelliPoint\point32.exe
C:\WINNT\MS\SMS\CLICOMP\SWDist32\bin\smsmon32.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINNT\system32\twinmqez.exe
C:\Program Files\iwla\oonm.exe
C:\Documents and Settings\jtingley\My Documents\M?crosoft.NET\w?auboot.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hposol08.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\Microsoft Office\Office\EXCEL.EXE
C:\PROGRA~1\WINZIP\winzip32.exe
C:\Documents and Settings\jtingley\Local Settings\Temp\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://onenet.p-west.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Pioneer
R3 - URLSearchHook: (no name) - {EB0F5831-BBA2-A400-F7CA-E22C846B5FC7} - C:\WINNT\system32\sqofjxti.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {37E265F8-8440-9FCE-3526-FD6A62DFDDC8} - C:\WINNT\system32\jcdaewn.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Banner Rotator - {D117A61F-92C3-4450-A0C8-F425B14D4127} - C:\WINNT\system32\adrotate.dll
O2 - BHO: (no name) - {EB0F5831-BBA2-A400-F7CA-E22C846B5FC7} - C:\WINNT\system32\sqofjxti.dll
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [PRPCMonitor] PRPCUI.exe
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINNT\system32\DSentry.exe
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [WinFaxAppPortStarter] wfxsnt40.exe
O4 - HKLM\..\Run: [SMS Application Launcher] C:\WINNT\MS\SMS\CORE\BIN\LAUNCH32.EXE
O4 - HKLM\..\Run: [ACUMon] "C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe" -a
O4 - HKLM\..\Run: [Home Page] C:\WINDOWS\system32\homepage.vbs
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\tbmon.exe"
O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\point32.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [adstart] iexplore.exe http://iesettingsupdate
O4 - HKLM\..\Run: [webHancer Survey Companion] "C:\Program Files\webHancer\Programs\whSurvey.exe"
O4 - HKLM\..\Run: [ntdll.dll] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKCU\..\Run: [Rstm] "C:\Program Files\iwla\oonm.exe" -vt yazb
O4 - HKCU\..\Run: [Lum] C:\Documents and Settings\jtingley\My Documents\M?crosoft.NET\w?auboot.exe
O4 - Startup: Zeno.lnk = C:\WINNT\system32\twinmqez.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: officejet 6100.lnk = C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hposol08.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O15 - Trusted Zone: *.elitemediagroup.net
O15 - Trusted Zone: *.mmohsix.com
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.com/...nst20040510.cab
O16 - DPF: {3299935F-2C5A-499A-9908-95CFFF6EF8C1} (Quicksilver Class) - http://vapwcb.ops.placeware.com/etc/place/...quicksilver.cab
O16 - DPF: {5526B4C6-63D6-41A1-9783-0FABF529859A} (mm06ocx.mm06ocxf) - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1147094762614
O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = p-west.com
O17 - HKLM\System\CCS\Services\Tcpip\..\{7BAD5C7C-E2A9-43B4-8EE8-47C40F901F17}: Domain = p-west.com
O17 - HKLM\System\CCS\Services\Tcpip\..\{7BAD5C7C-E2A9-43B4-8EE8-47C40F901F17}: NameServer = 172.18.2.6,172.18.2.7
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = p-west.com
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = p-west.com
O20 - AppInit_DLLs: C:\WINNT\system32\wucrtupd.dll
O20 - Winlogon Notify: ckpNotify - C:\WINNT\SYSTEM32\ckpNotify.dll
O23 - Service: Access Manager Configuration Service (AMBroker) - MCI, Inc. - C:\Program Files\AccessManager\Client\AMBroker.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINNT\system32\Ati2evxx.exe
O23 - Service: Visual Insight DA Plugin (DAPlugin) - MCI, Inc. - C:\Program Files\AccessManager\Client\DAPlugin.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lotus Notes Single Logon - IBM Corp - C:\WINNT\system32\nslsvice.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\vstskmgr.exe
O23 - Service: Multi-user Cleanup Service - IBM Corp - C:\Notes\ntmulti.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe
O23 - Service: SP Software Installer - Smartpipes, Inc. - C:\Program Files\AccessManager\PMAC\sp_SWIns.exe
O23 - Service: Visual Insight Dial Analysis (sp_spi_da) - Smartpipes, Inc. - C:\Program Files\AccessManager\SMOC\spi_da.exe
O23 - Service: Check Point SecuRemote Service (SR_Service) - Check Point Software Technologies - C:\Program Files\CheckPoint\SecuRemote\bin\SR_Service.exe
O23 - Service: Check Point SecuRemote WatchDog (SR_WatchDog) - Check Point Software Technologies - C:\Program Files\CheckPoint\SecuRemote\bin\SR_WatchDog.exe
O23 - Service: SSA Integration Manager (Sygman) - MCI, Inc. - C:\Program Files\AccessManager\Client\sygman.exe
O23 - Service: WinFax PRO (wfxsvc) - Symantec Corporation - C:\WINNT\system32\WFXSVC.EXE

BC AdBot (Login to Remove)

 


#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:01:07 AM

Posted 16 June 2006 - 03:30 PM

Go to the link below and download the trial version of SpySweeper:

SpySweeper http://www.webroot.com/consumer/products/s...&rc=4129&ac=tsg

* Click the Free Trial link under "SpySweeper" to download the program.
* Install it. Once the program is installed, it will open.
* It will prompt you to update to the latest definitions, click Yes.
* Once the definitions are installed, click Options on the left side.
* Click the Sweep Options tab.
* Under What to Sweep please put a check next to the following:
o Sweep Memory
o Sweep Registry
o Sweep Cookies
o Sweep All User Accounts
o Enable Direct Disk Sweeping
o Sweep Contents of Compressed Files
o Sweep for Rootkits

o Please UNCHECK Do not Sweep System Restore Folder.

* Click Sweep Now on the left side.
* Click the Start button.
* When it's done scanning, click the Next button.
* Make sure everything has a check next to it, then click the Next button.
* It will remove all of the items found.
* Click Session Log in the upper right corner, copy everything in that window.
* Click the Summary tab and click Finish.
* Paste the contents of the session log you copied into your next reply.
Also post a new Hijack This log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 j1718

j1718
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:07 AM

Posted 18 June 2006 - 07:48 PM

Thanks for the help

Here is my spy sweeper summary


6:15 PM: | Start of Session, Sunday, June 18, 2006 |
6:15 PM: Spy Sweeper started
6:15 PM: Sweep initiated using definitions version 701
6:15 PM: Starting Memory Sweep
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: The Spy Communication shield has blocked access to: focusin.ads.targetnet.com
6:16 PM: Found Adware: purityscan
6:16 PM: Detected running threat: C:\WINNT\system32\sqofjxti.dll (ID = 230)
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:18 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:31 PM: Detected running threat: C:\Program Files\iwla\oonm.exe (ID = 230)
6:33 PM: Found Adware: zenosearchassistant
6:33 PM: Detected running threat: C:\WINNT\system32\twinmqez.exe (ID = 412)
6:33 PM: HKLM\Software\Microsoft\Windows\CurrentVersion\Run || BrowserUpdateSched (ID = 0)
6:33 PM: Memory Sweep Complete, Elapsed Time: 00:18:08
6:33 PM: Starting Registry Sweep
6:34 PM: Found Adware: elitemediagroup-mediamotor
6:34 PM: HKLM\software\mm\ (1 subtraces) (ID = 140211)
6:34 PM: Found Adware: webhancer
6:34 PM: HKLM\software\microsoft\windows\currentversion\run\ || webhancer survey companion (ID = 146273)
6:34 PM: HKLM\software\microsoft\windows\currentversion\app management\arpcache\enhanced ads by zeno\ (2 subtraces) (ID = 147931)
6:34 PM: HKLM\software\microsoft\windows\currentversion\uninstall\enhanced ads by zeno\ (2 subtraces) (ID = 147934)
6:34 PM: HKLM\software\microsoft\windows\currentversion\uninstall\zeno search assistant\ (2 subtraces) (ID = 147935)
6:34 PM: Found Adware: command
6:34 PM: HKLM\system\currentcontrolset\services\cmdservice\ (5 subtraces) (ID = 958670)
6:34 PM: Found Adware: elitemediagroup-pop64
6:34 PM: HKCR\interface\{efdfe6ee-8888-422e-ab3c-b48589338ae3}\ (8 subtraces) (ID = 967541)
6:34 PM: HKLM\software\classes\interface\{efdfe6ee-8888-422e-ab3c-b48589338ae3}\ (8 subtraces) (ID = 967601)
6:34 PM: HKLM\system\currentcontrolset\enum\root\legacy_cmdservice\0000\ (6 subtraces) (ID = 1016064)
6:34 PM: HKLM\system\currentcontrolset\enum\root\legacy_cmdservice\ (8 subtraces) (ID = 1016072)
6:34 PM: Found Trojan Horse: trojan-phisher-raven
6:34 PM: HKLM\software\microsoft\windows\currentversion\run\ || ntdll.dll (ID = 1044887)
6:34 PM: HKLM\software\microsoft\windows\currentversion\uninstall\elitemediagroupoin\ (2 subtraces) (ID = 1070163)
6:34 PM: HKLM\software\microsoft\windows\currentversion\run\ || browserupdatesched (ID = 1075246)
6:34 PM: HKLM\software\microsoft\code store database\distribution units\{9ac54695-69a4-46f1-be10-10c74f9520d5}\ (12 subtraces) (ID = 1122691)
6:34 PM: Found Adware: safesearch
6:34 PM: HKLM\software\microsoft\windows\currentversion\app paths\irism\ (2 subtraces) (ID = 1160093)
6:34 PM: HKLM\software\microsoft\windows\currentversion\uninstall\irismon\ (2 subtraces) (ID = 1165617)
6:34 PM: HKCR\mm06ocx.mm06ocxf\ (3 subtraces) (ID = 1323762)
6:34 PM: HKCR\clsid\{5526b4c6-63d6-41a1-9783-0fabf529859a}\ (27 subtraces) (ID = 1323770)
6:34 PM: HKCR\typelib\{d13decbb-52f8-4bf4-ba6c-b0cc603963c9}\ (9 subtraces) (ID = 1323794)
6:34 PM: HKLM\software\classes\mm06ocx.mm06ocxf\ (3 subtraces) (ID = 1323810)
6:34 PM: HKLM\software\classes\clsid\{5526b4c6-63d6-41a1-9783-0fabf529859a}\ (27 subtraces) (ID = 1323818)
6:34 PM: HKLM\software\classes\typelib\{d13decbb-52f8-4bf4-ba6c-b0cc603963c9}\ (9 subtraces) (ID = 1323842)
6:34 PM: HKLM\software\microsoft\code store database\distribution units\{5526b4c6-63d6-41a1-9783-0fabf529859a}\ (12 subtraces) (ID = 1323895)
6:34 PM: Found Adware: trafficsolution
6:34 PM: HKCR\bannerrotator.rotator\ (5 subtraces) (ID = 1337087)
6:34 PM: HKCR\clsid\{d117a61f-92c3-4450-a0c8-f425b14d4127}\ (11 subtraces) (ID = 1337097)
6:34 PM: HKCR\typelib\{defdeada-c390-4eb9-97fa-59d56b21e5d5}\ (9 subtraces) (ID = 1337109)
6:34 PM: HKLM\software\classes\clsid\{d117a61f-92c3-4450-a0c8-f425b14d4127}\ (11 subtraces) (ID = 1337128)
6:34 PM: HKLM\software\classes\typelib\{defdeada-c390-4eb9-97fa-59d56b21e5d5}\ (9 subtraces) (ID = 1337140)
6:34 PM: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objects\{d117a61f-92c3-4450-a0c8-f425b14d4127}\ (1 subtraces) (ID = 1342110)
6:34 PM: HKCR\interface\{41e1565d-b7a8-4251-bd79-e6c5facb2b5f}\ (7 subtraces) (ID = 1497876)
6:34 PM: HKCR\interface\{db312456-e762-4369-844a-aed9006b1b2f}\ (7 subtraces) (ID = 1497938)
6:34 PM: HKLM\software\classes\interface\{41e1565d-b7a8-4251-bd79-e6c5facb2b5f}\ (7 subtraces) (ID = 1502038)
6:34 PM: HKLM\software\classes\interface\{db312456-e762-4369-844a-aed9006b1b2f}\ (7 subtraces) (ID = 1502064)
6:34 PM: Registry Sweep Complete, Elapsed Time:00:00:39
6:34 PM: Starting Cookie Sweep
6:34 PM: Found Spy Cookie: yieldmanager cookie
6:34 PM: jtingley@ad.yieldmanager[1].txt (ID = 3751)
6:34 PM: jtingley@ad.yieldmanager[2].txt (ID = 3751)
6:34 PM: Found Spy Cookie: adknowledge cookie
6:34 PM: jtingley@adknowledge[2].txt (ID = 2072)
6:34 PM: Found Spy Cookie: specificclick.com cookie
6:34 PM: jtingley@adopt.specificclick[2].txt (ID = 3400)
6:34 PM: Found Spy Cookie: addynamix cookie
6:34 PM: jtingley@ads.addynamix[2].txt (ID = 2062)
6:34 PM: Found Spy Cookie: pointroll cookie
6:34 PM: jtingley@ads.pointroll[2].txt (ID = 3148)
6:34 PM: Found Spy Cookie: zenotecnico cookie
6:34 PM: jtingley@ads4.zenotecnico[2].txt (ID = 3859)
6:34 PM: Found Spy Cookie: tacoda cookie
6:34 PM: jtingley@anad.tacoda[2].txt (ID = 6445)
6:34 PM: jtingley@anat.tacoda[1].txt (ID = 6445)
6:34 PM: Found Spy Cookie: falkag cookie
6:34 PM: jtingley@as-us.falkag[2].txt (ID = 2650)
6:34 PM: Found Spy Cookie: atlas dmt cookie
6:34 PM: jtingley@atdmt[2].txt (ID = 2253)
6:34 PM: Found Spy Cookie: fortunecity cookie
6:34 PM: jtingley@fortunecity[2].txt (ID = 2686)
6:34 PM: Found Spy Cookie: mediaplex cookie
6:34 PM: jtingley@mediaplex[1].txt (ID = 6442)
6:34 PM: Found Spy Cookie: questionmarket cookie
6:34 PM: jtingley@questionmarket[1].txt (ID = 3217)
6:34 PM: Found Spy Cookie: realmedia cookie
6:34 PM: jtingley@realmedia[1].txt (ID = 3235)
6:34 PM: Found Spy Cookie: valuead cookie
6:34 PM: jtingley@reduxads.valuead[1].txt (ID = 3627)
6:34 PM: Found Spy Cookie: serving-sys cookie
6:34 PM: jtingley@serving-sys[2].txt (ID = 3343)
6:34 PM: jtingley@tacoda[1].txt (ID = 6444)
6:34 PM: Found Spy Cookie: trafficmp cookie
6:34 PM: jtingley@trafficmp[2].txt (ID = 3581)
6:34 PM: Found Spy Cookie: tribalfusion cookie
6:34 PM: jtingley@tribalfusion[2].txt (ID = 3589)
6:34 PM: Found Spy Cookie: burstbeacon cookie
6:34 PM: jtingley@www.burstbeacon[1].txt (ID = 2335)
6:34 PM: jtingley@yieldmanager[1].txt (ID = 3749)
6:34 PM: Found Spy Cookie: zedo cookie
6:34 PM: jtingley@zedo[2].txt (ID = 3762)
6:34 PM: Cookie Sweep Complete, Elapsed Time: 00:00:01
6:34 PM: Starting File Sweep
6:36 PM: idlemg.exe (ID = 235944)
6:38 PM: bitsprx4.dll (ID = 292648)
6:39 PM: pldsregn.exe (ID = 293)
6:48 PM: Found Adware: enbrowser
6:48 PM: uni_ehhh.exe (ID = 296335)
6:51 PM: thiselt.exe (ID = 296393)
6:52 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:52 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:52 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:52 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:53 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
6:56 PM: nt68rrtc12.sys (ID = 220230)
6:58 PM: taga96.exe (ID = 296323)
6:58 PM: amm06.ocx (ID = 306160)
7:00 PM: pldsregp.exe (ID = 293)
7:01 PM: yoinsi.exe (ID = 213483)
7:02 PM: elitemediagroupoinuninstaller.exe (ID = 305735)
7:02 PM: amm06.inf (ID = 297265)
7:02 PM: Found Adware: ezula ilookup
7:02 PM: justin2a.exe (ID = 279493)
7:03 PM: tagasuarus2.exe (ID = 301974)
7:03 PM: z_start.lnk (ID = 235994)
7:03 PM: Warning: Failed to open file "c:\documents and settings\jtingley\local settings\temporary internet files\content.ie5\cpqrs5ij\x_d[1].gif". The system cannot find the file specified
7:03 PM: Warning: Failed to open file "c:\documents and settings\jtingley\local settings\temporary internet files\content.ie5\whqj01u7\30[1].gif". The system cannot find the file specified
7:03 PM: Warning: Failed to open file "c:\documents and settings\jtingley\local settings\temporary internet files\content.ie5\6h0zmbqd\28[1].gif". The system cannot find the file specified
7:03 PM: zeno.lnk (ID = 146127)
7:04 PM: zeno.lnk (ID = 146127)
7:04 PM: o35svap5w0.vbs (ID = 185675)
7:04 PM: zxdnt3d.cfg (ID = 91140)
7:04 PM: File Sweep Complete, Elapsed Time: 00:30:12
7:04 PM: Full Sweep has completed. Elapsed time 00:49:11
7:04 PM: Traces Found: 303
8:37 PM: Removal process initiated
8:38 PM: Quarantining All Traces: purityscan
8:38 PM: purityscan is in use. It will be removed on reboot.
8:38 PM: C:\WINNT\system32\sqofjxti.dll is in use. It will be removed on reboot.
8:38 PM: C:\Program Files\iwla\oonm.exe is in use. It will be removed on reboot.
8:38 PM: Quarantining All Traces: zenosearchassistant
8:38 PM: Quarantining All Traces: elitemediagroup-mediamotor
8:38 PM: Quarantining All Traces: enbrowser
8:38 PM: Quarantining All Traces: safesearch
8:38 PM: Quarantining All Traces: trojan-phisher-raven
8:38 PM: Quarantining All Traces: command
8:38 PM: Quarantining All Traces: elitemediagroup-pop64
8:38 PM: Quarantining All Traces: ezula ilookup
8:38 PM: Quarantining All Traces: trafficsolution
8:38 PM: Quarantining All Traces: webhancer
8:38 PM: Quarantining All Traces: addynamix cookie
8:38 PM: Quarantining All Traces: adknowledge cookie
8:38 PM: Quarantining All Traces: atlas dmt cookie
8:38 PM: Quarantining All Traces: burstbeacon cookie
8:38 PM: Quarantining All Traces: falkag cookie
8:38 PM: Quarantining All Traces: fortunecity cookie
8:38 PM: Quarantining All Traces: mediaplex cookie
8:38 PM: Quarantining All Traces: pointroll cookie
8:38 PM: Quarantining All Traces: questionmarket cookie
8:38 PM: Quarantining All Traces: realmedia cookie
8:38 PM: Quarantining All Traces: serving-sys cookie
8:38 PM: Quarantining All Traces: specificclick.com cookie
8:38 PM: Quarantining All Traces: tacoda cookie
8:38 PM: Quarantining All Traces: trafficmp cookie
8:38 PM: Quarantining All Traces: tribalfusion cookie
8:38 PM: Quarantining All Traces: valuead cookie
8:38 PM: Quarantining All Traces: yieldmanager cookie
8:38 PM: Quarantining All Traces: zedo cookie
8:38 PM: Quarantining All Traces: zenotecnico cookie
8:38 PM: Preparing to restart your computer. Please wait...
8:38 PM: Removal process completed. Elapsed time 00:00:46
********
6:12 PM: | Start of Session, Sunday, June 18, 2006 |
6:12 PM: Spy Sweeper started
6:13 PM: Messenger service has been disabled.
6:14 PM: Your spyware definitions have been updated.
6:15 PM: | End of Session, Sunday, June 18, 2006 |


Here is my hack this log


Scan saved at 8:47:15 PM, on 6/18/2006
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\nslsvice.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\AccessManager\Client\AMBroker.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\hidserv.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\mcshield.exe
C:\Program Files\Network Associates\VirusScan\vstskmgr.exe
C:\Notes\ntmulti.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\System32\SCardSvr.exe
C:\WINNT\system32\MSTask.exe
C:\Program Files\AccessManager\PMAC\sp_SWIns.exe
C:\Program Files\CheckPoint\SecuRemote\bin\SR_Service.exe
C:\Program Files\CheckPoint\SecuRemote\bin\SR_WatchDog.exe
C:\WINNT\system32\stisvc.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\AccessManager\Client\sygman.exe
C:\WINNT\system32\WFXSVC.EXE
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\Program Files\Symantec\WinFax\WFXMOD32.EXE
C:\WINNT\system32\svchost.exe
C:\WINNT\MS\SMS\CLICOMP\RemCtrl\Wuser32.exe
C:\WINNT\MS\SMS\clicomp\apa\Bin\smsapm32.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\Program Files\CheckPoint\SecuRemote\bin\SR_GUI.Exe
C:\WINNT\system32\PRPCUI.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINNT\system32\DSentry.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\WINNT\system32\wfxsnt40.exe
C:\WINNT\MS\SMS\CORE\BIN\LAUNCH32.EXE
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe
C:\Program Files\Common Files\Network Associates\TalkBack\tbmon.exe
C:\Program Files\Microsoft IntelliPoint\point32.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINNT\MS\SMS\CLICOMP\SWDist32\bin\smsmon32.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Documents and Settings\jtingley\My Documents\M?crosoft.NET\w?auboot.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hposol08.exe
C:\Program Files\AccessManager\Client\AccessMgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\WINZIP\winzip32.exe
C:\Documents and Settings\jtingley\Local Settings\Temp\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://onenet.p-west.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Pioneer
R3 - URLSearchHook: (no name) - {EB0F5831-BBA2-A400-F7CA-E22C846B5FC7} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {37E265F8-8440-9FCE-3526-FD6A62DFDDC8} - C:\WINNT\system32\jcdaewn.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [PRPCMonitor] PRPCUI.exe
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINNT\system32\DSentry.exe
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [WinFaxAppPortStarter] wfxsnt40.exe
O4 - HKLM\..\Run: [SMS Application Launcher] C:\WINNT\MS\SMS\CORE\BIN\LAUNCH32.EXE
O4 - HKLM\..\Run: [ACUMon] "C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe" -a
O4 - HKLM\..\Run: [Home Page] C:\WINDOWS\system32\homepage.vbs
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\tbmon.exe"
O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\point32.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [adstart] iexplore.exe http://iesettingsupdate
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [Rstm] "C:\Program Files\iwla\oonm.exe" -vt yazb
O4 - HKCU\..\Run: [Lum] C:\Documents and Settings\jtingley\My Documents\M?crosoft.NET\w?auboot.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: officejet 6100.lnk = C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hposol08.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O15 - Trusted Zone: *.elitemediagroup.net
O15 - Trusted Zone: *.mmohsix.com
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.com/...nst20040510.cab
O16 - DPF: {3299935F-2C5A-499A-9908-95CFFF6EF8C1} (Quicksilver Class) - http://vapwcb.ops.placeware.com/etc/place/...quicksilver.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1147094762614
O16 - DPF: {A0EAC162-A012-4AD8-B2E1-D5A0BBBCDA51} (PopupSh Control) - http://209.190.31.42/display/PopupSh.ocx
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = p-west.com
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = p-west.com
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = p-west.com
O20 - AppInit_DLLs: C:\WINNT\system32\wucrtupd.dll
O20 - Winlogon Notify: ckpNotify - C:\WINNT\SYSTEM32\ckpNotify.dll
O20 - Winlogon Notify: WRNotifier - C:\WINNT\SYSTEM32\WRLogonNTF.dll
O23 - Service: Access Manager Configuration Service (AMBroker) - MCI, Inc. - C:\Program Files\AccessManager\Client\AMBroker.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINNT\system32\Ati2evxx.exe
O23 - Service: Visual Insight DA Plugin (DAPlugin) - MCI, Inc. - C:\Program Files\AccessManager\Client\DAPlugin.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lotus Notes Single Logon - IBM Corp - C:\WINNT\system32\nslsvice.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\vstskmgr.exe
O23 - Service: Multi-user Cleanup Service - IBM Corp - C:\Notes\ntmulti.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe
O23 - Service: SP Software Installer - Smartpipes, Inc. - C:\Program Files\AccessManager\PMAC\sp_SWIns.exe
O23 - Service: Visual Insight Dial Analysis (sp_spi_da) - Smartpipes, Inc. - C:\Program Files\AccessManager\SMOC\spi_da.exe
O23 - Service: Check Point SecuRemote Service (SR_Service) - Check Point Software Technologies - C:\Program Files\CheckPoint\SecuRemote\bin\SR_Service.exe
O23 - Service: Check Point SecuRemote WatchDog (SR_WatchDog) - Check Point Software Technologies - C:\Program Files\CheckPoint\SecuRemote\bin\SR_WatchDog.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: SSA Integration Manager (Sygman) - MCI, Inc. - C:\Program Files\AccessManager\Client\sygman.exe
O23 - Service: WinFax PRO (wfxsvc) - Symantec Corporation - C:\WINNT\system32\WFXSVC.EXE

#4 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:01:07 AM

Posted 19 June 2006 - 01:10 PM

You may want to print this or save it to notepad as we will go to safe mode.

Fix these with HJT – mark them, close IE, click fix checked

R3 - URLSearchHook: (no name) - {EB0F5831-BBA2-A400-F7CA-E22C846B5FC7} - (no file)

O2 - BHO: (no name) - {37E265F8-8440-9FCE-3526-FD6A62DFDDC8} - C:\WINNT\system32\jcdaewn.dll (file missing)

O4 - HKLM\..\Run: [Home Page] C:\WINDOWS\system32\homepage.vbs

O4 - HKLM\..\Run: [adstart] iexplore.exe http://iesettingsupdate

O4 - HKCU\..\Run: [Rstm] "C:\Program Files\iwla\oonm.exe" -vt yazb

O4 - HKCU\..\Run: [Lum] C:\Documents and Settings\jtingley\My Documents\M?crosoft.NET\w?auboot.exe

O15 - Trusted Zone: *.elitemediagroup.net

O15 - Trusted Zone: *.mmohsix.com

O20 - AppInit_DLLs: C:\WINNT\system32\wucrtupd.dll

DownLoad http://www.downloads.subratam.org/KillBox.zip

Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\WINDOWS\system32\homepage.vbs
C:\Documents and Settings\jtingley\My Documents\M?crosoft.NET
C:\WINDOWS\system32\iexplore.exe
C:\WINNT\system32\wucrtupd.dll
C:\Program Files\iwla


Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot and post a new log from normal NOT safe mode

Please give feedback on what worked/didn’t work and the current status of your system
"Nothing could be finer than to be in South Carolina ............"

Member ASAP




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users