Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

*exmodul*.exe


  • This topic is locked This topic is locked
6 replies to this topic

#1 elinatim

elinatim

  • Members
  • 98 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:56 AM

Posted 09 January 2007 - 04:22 PM

I had a lot of files with the name *exmodul*.exe in my process list. I deleted the smss.exe file in my system folder (NOT the legit one in System32). Then I ran Ad-Aware and Spybot and restarted the computer. Here is my hijackthis log. Please tell me if you see anything else I should do with this computer now.

Thank you for your great site!

Logfile of HijackThis v1.99.1
Scan saved at 1:21:04 PM, on 1/9/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\lotus\organize\easyclip6.exe
C:\WINDOWS\system32\wuauclt.exe
F:\back office\bolezni\Hijack\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/mywaybiz
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.kvcs.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/mywaybiz
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/mywaybiz
R3 - URLSearchHook: (no name) - {4D25F926-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\1.bin\deSrcAs.dll
O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_1.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {4D25F921-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\1.bin\deSrcAs.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
O4 - Startup: Network Connection Icon.lnk = ?
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Lotus Organizer EasyClip.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Web Entry - {B4E30F61-16D9-11D3-85D1-005004229569} - c:\lotus\organize\bandobjs.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = KVCS.LOCAL
O17 - HKLM\Software\..\Telephony: DomainName = KVCS.LOCAL
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = KVCS.LOCAL
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxdev.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: Windows Log - Unknown owner - C:\WINDOWS\system32\nvsvcd.exe

Edited by elinatim, 09 January 2007 - 04:23 PM.


BC AdBot (Login to Remove)

 


#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:12:56 AM

Posted 10 January 2007 - 03:03 PM

You have no active AntiVirus!

Get the free AVG AntiVirus 7.5 install it, check for updates and run a full scan

AVG 7.5 - http://free.grisoft.com/freeweb.php/doc/2/

================================

Add remove programs – remove MyWay Search

You may want to print this or save it to notepad as we will go to safe mode.

Fix these with HiJackThis – mark them, close IE, click fix checked

R3 - URLSearchHook: (no name) - {4D25F926-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\1.bin\deSrcAs.dll

O2 - BHO: (no name) - {4D25F921-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\1.bin\deSrcAs.dll

O23 - Service: Windows Log - Unknown owner - C:\WINDOWS\system32\nvsvcd.exe

DownLoad http://www.downloads.subratam.org/KillBox.zip or
http://www.thespykiller.co.uk/files/killbox.exe
=======================
Click Start > Run > and type in:

services.msc

Click OK.

In the services window find this exact name

Windows Log

Rightclick and choose "Properties". Beside "Startup Type" in the dropdown menu select "Disabled". On the "General" tab under "Service Status" click the "Stop" button to stop the service. Click Apply then OK. File-Exit the Services utility.


========================
Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\WINDOWS\system32\nvsvcd.exe
C:\Program Files\MyWaySA

Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot


Download Superantispyware

http://www.superantispyware.com/superantis...efreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.


Please give feedback on what worked/didn’t work and the current status of your system
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 elinatim

elinatim
  • Topic Starter

  • Members
  • 98 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:56 AM

Posted 11 January 2007 - 03:53 PM

Thank you for your instructions. I have one quick question: When I ran Superantispyware, I checked the items you mentioned AND DESELECTED ALL OTHER ITEMS. I hope that is what you meant. Anyway, here are my superantispyware log and a fresh hijack this log (without a restart):

SUPERAntiSpyware Scan Log
Generated 01/11/2007 at 12:44 PM

Application Version : 3.4.1000

Core Rules Database Version : 3162
Trace Rules Database Version: 1174

Scan type : Complete Scan
Total Scan Time : 00:34:00

Memory items scanned : 362
Memory threats detected : 0
Registry items scanned : 5488
Registry threats detected : 0
File items scanned : 41291
File threats detected : 116

Adware.Tracking Cookie
C:\Documents and Settings\jrhodes\Cookies\jrhodes@belnk[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.monster[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.pointroll[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@rotator.adjuggler[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@cgi-bin[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adknowledge[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@75850083[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@mediaplex[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@goodyear.122.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adserver[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@overture[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adinterax[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@fastclick[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@serving-sys[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@edge.ru4[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@atdmt[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@www.burstbeacon[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@tradedoubler[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@pt.crossmediaservices[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@questionmarket[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@hypertracker[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@chicagosuntimes.122.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ad.tbn[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ad.yieldmanager[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.adsag[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adv.webmd[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@zedo[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adrevolver[3].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@icc.intellisrv[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@hc2.humanclick[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@realmedia[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.realcastmedia[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@dcswooebsl81mka3xdp0enj6q_1v2p[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@statcounter[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.digitalpoint[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@z1.adserver[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@qnsr[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adopt.specificclick[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@dist.belnk[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.abcteach[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@sel.as-us.falkag[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@cgi-bin[5].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@i.screensavers[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@stats1.clicktracks[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@cgi-bin[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@perf.overture[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@bizrate[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@atwola[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@advertising[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adrevolver[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.addynamix[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@tribalfusion[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@www.screensavers[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@doubleclick[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@casalemedia[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@tacoda[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@brockbankenterprise.112.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@maxserving[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@apmebf[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@yadro[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@coolsavings[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.as4x.tmcs[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@2o7[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ad.100.tbn[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.vegas[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@clickability[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@indextools[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@bluestreak[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ad12.bannerbank[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@partner2profit[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@trafficmp[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@qksrv[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.as4x.tmcs.ticketmaster[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@citi.bridgetrack[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@nextag[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ad6.bannerbank[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@burstnet[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@banner[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@data2.perf.overture[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.oneplace[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@cnn.122.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@data4.perf.overture[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@printmediakit.economist[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@anat.tacoda[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ecnext.advertserve[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@tripod[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.cnn[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@roiservice[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@media7.sitebrand[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@server.iad.liveperson[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@86350344[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.ussearch[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@revsci[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@anad.tacoda[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@e-2dj6wfk4qjajcap.stats.esomniture[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@62210861[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@adopt.euroclick[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@counter.surfcounters[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@stat.dealtime[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@pro-market[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@88153289[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ad[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@www.adultadd[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@honfurniture.122.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@msnportal.112.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@cgi-bin[6].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@e-2dj6wjliwocjahq.stats.esomniture[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@media.hotels[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@web-stat[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ford.112.2o7[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@stats.adbrite[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@jkearn.freestats[2].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@keywordmax[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@ads.realtechnetwork[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@1072358158[1].txt
C:\Documents and Settings\jrhodes\Cookies\jrhodes@counter[1].txt



============================================


Logfile of HijackThis v1.99.1
Scan saved at 12:54:41 PM, on 1/11/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\lotus\organize\easyclip6.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
F:\back office\bolezni\Hijack\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/mywaybiz
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.kvcs.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/mywaybiz
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/mywaybiz
O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_1.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Startup: Network Connection Icon.lnk = ?
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Lotus Organizer EasyClip.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Web Entry - {B4E30F61-16D9-11D3-85D1-005004229569} - c:\lotus\organize\bandobjs.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = KVCS.LOCAL
O17 - HKLM\Software\..\Telephony: DomainName = KVCS.LOCAL
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = KVCS.LOCAL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxdev.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe

#4 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:12:56 AM

Posted 11 January 2007 - 04:19 PM

IE - Block Third party cookies
1. Click on the Tools button on the Internet Explorer tool bar.
2. Highlight and click on Internet options at the bottom of the Tools menu.
3. Select the Privacy Tab of the Internet Options menu.
4. Select the Advanced... button at the bottom of the screen.
5. Select override automatic cookie handling button.
6. To block third party cookies select block under "Third-party cookies".
7. Select "always allow session cookies".
8. Click on the OK button at the bottom of the screen.
=================

How are things??
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#5 elinatim

elinatim
  • Topic Starter

  • Members
  • 98 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:56 AM

Posted 11 January 2007 - 05:50 PM

Thanks to you, everything is working well now. I've had a tiring morning at my colleague's workstation, though. My own work is still waiting for me to get back to my desk.

#6 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:12:56 AM

Posted 11 January 2007 - 05:58 PM

Clean Posted Image

Turn off restore points, boot, turn them back on – here’s how

http://service1.symantec.com/SUPPORT/tsgen...src=sec_doc_nam
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#7 elinatim

elinatim
  • Topic Starter

  • Members
  • 98 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:56 AM

Posted 11 January 2007 - 08:04 PM

Done! This case is closed. Now I can get back to my work...OOPS! Look at the time! Going home to play on the :thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users