1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Virus causing popup and slowdown, maybe steeling passwords

Discussion in 'Virus & Other Malware Removal' started by Chris83, Sep 30, 2008.

Thread Status:
Not open for further replies.
Advertisement
  1. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    My computer have several issues which I suspect all come from the same source. Avast reacted 2 weeks ago on a downloader virus, and it was quarantined.


    The virus problems i have now following this downloader (i think):
    1. A pop-up message asking to sign in with Windows Live ID, but this looks dodgy, and I am already signed in! This popup occur randomly, but I have discovered that it always pops up when i accsess D:\Documents and Settings\Chissamann (Chissamann is my username). See attached file for a picture (print screen, sclaed colours down to achieve low size).
    2. My computer (startup and processes) are slower than normal, and my internet is very slow!
    3. I have found some VERY SUSPICIOUS files on my computer's d drive where windows is installed, file is called D:\ZB20060217141000001.xml, and when I open it explorer stops it, and says that IE for security reasons rstricts this webpage to run scripts or ActiveX controls that could access my computer. Most worrying is the script looks like it is made to STEAL my personal photos: <?xml version="1.0" encoding="Shift_JIS" ?>
    - <CAMERA_ACTION REV="1.0" DATE="2006-02-17T14:10:00:00">
    - <ITEM_COLLECTION>
    <ITEM SRC="C:\Bilder\2006_02_04\IMG_2438.JPG" />

    <ITEM SRC="C:\Bilder\2006_02_04\IMG_2439.JPG" />

    <ITEM SRC="C:\Bilder\2006_02_05\IMG_2442.JPG" />
    Cut by me (it is a long list)........
    <ITEM SRC="C:\Bilder\2006_02_06\IMG_2851.JPG" />

    <ITEM SRC="C:\Bilder\2006_02_06\IMG_2852.JPG" />

    <ITEM SRC="C:\Bilder\2006_02_06\IMG_2853.JPG" />

    </ITEM_COLLECTION>


    <CURRENT_FOLDER SRC="C:\Bilder" />

    </CAMERA_ACTION>









    When I run Avast, AdAware, Spybot and Malwarebytes, they all come up clean. So the virus must be sofisticated, being able to hide from these.

    This is my trend HijackThis log:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 16:43:07, on 30.09.2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16674)
    Boot mode: Normal

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    D:\Program Files\Alwil Software\Avast4\ashServ.exe
    D:\WINDOWS\Explorer.EXE
    D:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    D:\Program Files\MSN Messenger\MsnMsgr.Exe
    D:\Program Files\Google\Google Talk\googletalk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\Program Files\MSN Messenger\Phone\Skype.exe
    D:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    D:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    D:\Program Files\MSN Messenger\Plugin Manager\skypePM.exe
    D:\WINDOWS\System32\LVComsX.exe
    D:\WINDOWS\System32\svchost.exe
    D:\Program Files\Mozilla Firefox\firefox.exe
    D:\WINDOWS\system32\NOTEPAD.EXE
    D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.unimelb.edu.au/
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - HKLM\..\Run: [SynTPEnh] D:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [avast!] D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKCU\..\Run: [MsnMsgr] "D:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [googletalk] "D:\Program Files\Google\Google Talk\googletalk.exe" /autostart
    O4 - HKCU\..\Run: [Skype] "D:\Program Files\MSN Messenger\Phone\Skype.exe" /nosplash /minimized
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] D:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\ctfmon.exe (User 'Default user')
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe
    O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\poker\Party\PartyPoker\RunApp.exe
    O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\poker\Party\PartyPoker\RunApp.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - D:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - D:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - D:\Program Files\PartyPoker.net\partypokernet.exe (file missing)
    O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - D:\Program Files\PartyPoker.net\partypokernet.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O16 - DPF: ImageUploader - http://www.direktefoto.no/df/Aurigma/ImageUploader.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1126801348456
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1142168542307
    O16 - DPF: {D8575CE3-3432-4540-88A9-85A1325D3375} (e-Safekey) - https://netbank.danskebank.dk/html/activex/e-Safekey/DB/e-Safekey.cab
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CS3\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - D:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashWebSv.exe

    --
    End of file - 6177 bytes


    PLEASE HELP ME!!!! Since the virus is trying to steal my username and password from MSN Live, it may also try to steal other passwords, or may already have done it!!! And it may be stealing my personal files!!!:eek:



    [​IMG]
     

    Attached Files:

  2. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    Hi there. I don't see anything in your log.


    Disable Spybot's teatimer as it may interfere in the scans!


    You need to get a firewall!


    Comodo firewall. Sign up it's free!

    http://www.personalfirewall.trustix.com/





    * Click here to download ATF Cleaner by Atribune and save it to your
    desktop.

    http://majorgeeks.com/ATF_Cleaner_d4949.html


    * Double-click ATF-Cleaner.exe to run the program.
    * Under Main choose: Select All
    * Click the Empty Selected button.
    o If you use Firefox:
    + Click Firefox at the top and choose: Select All
    + Click the Empty Selected button.
    + NOTE: If you would like to keep your saved passwords,
    please click No at the prompt.
    o If you use Opera:
    + Click Opera at the top and choose: Select All
    + Click the Empty Selected button.
    + NOTE: If you would like to keep your saved passwords,
    please click No at the prompt.
    * Click Exit on the Main menu to close the program.


    Threads on comodo!

    http://www.wilderssecurity.com/forumdisplay.php?f=31



    Download SDFix and save it to your Desktop.

    http://downloads.andymanchesta.com/RemovalTools/SDFix.exe

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :

    * Restart your computer
    * After hearing your computer beep once during startup, but before the
    Windows icon appears, tap the F8 key continually;
    * Instead of Windows loading as normal, the Advanced Options Menu should
    appear;
    * Select the first option, to run Windows in Safe Mode, then press
    Enter.
    * Choose your usual account.

    * Open the extracted SDFix folder and double click RunThis.bat to start
    the script.
    * Type Y to begin the cleanup process.
    * It will remove any Trojan Services and Registry Entries that it finds
    then prompt you to press any key to Reboot.
    * Press any Key and it will restart the PC.
    * When the PC restarts the Fixtool will run again and complete the
    removal process then display Finished, press any key to end the script and
    load your desktop icons.
    * Once the desktop icons load the SDFix report will open on screen and
    also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on
    the forum).
    * Finally paste the contents of the Report.txt back on the forum with a
    new HijackThis log

    _____________________________________________________________________

    NOTE: If you have downloaded ComboFix previously please delete that
    version and download it again!


    Please visit this webpage for instructions for downloading and running
    ComboFix.


    http://www.bleepingcomputer.com/combofix/how-to-use-combofix


    Post the log from ComboFix when you've accomplished that along with a
    new HijackThis log.


    Download ComboFix from
    Here
    or
    Here
    to your Desktop.

    Reboot to Safe mode:

    Restart your computer and begin tapping the F8 key on your keyboard just
    before Windows starts to load. If done right a Windows Advanced Options menu
    will appear. Select the Safe Mode option and press Enter.

    Perform the following actions in Safe Mode.
    • Double click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Post that log and a
      HiJackthis log in your next reply
    Note: Do not mouseclick combofix's window while its
    running. That may cause it to stall





    * Download Dr.Web CureIt to the desktop:
    ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

    * Doubleclick the drweb-cureit.exe file and Allow to run the express scan
    * This will scan the files currently running in memory and when something is
    found,
    click the yes button when it asks you if you want to cure it. This is only a
    short scan.
    * Once the short scan has finished, Click Options > Change settings
    * Choose the "Scan"-tab, remove the mark at "Heuristic analysis".
    * Back at the main window, mark the drives that you want to scan.
    * Select all drives. A red dot shows which drives have been chosen.
    * Click the green arrow at the right, and the scan will start.
    * Click 'Yes to all' if it asks if you want to cure/move the file.
    * When the scan has finished, look if you can click next icon next to the
    files found: IPB Image
    * If so, click it and then click the next icon right below and select Move
    incurable as you'll see in next image:
    IPB Image
    This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it
    can't be cured. (this in case if we need samples)
    * After selecting, in the Dr.Web CureIt menu on top, click file and choose
    save report list
    * Save the report to your desktop. The report will be called DrWeb.csv
    * Close Dr.Web Cureit.
    * Reboot your computer!! Because it could be possible that files in use will
    be moved/deleted during reboot.




    Post a new hijack this, the dr web scan log, the combo log, and the sdfix log!
     
  3. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    Thank you for quick help, it is much appreciated! Hope we can solve this issue!

    This is the logs from Dr.Web, hijackThis, SDFix and COMBO, all run when spybot was disabled:

    SDFix: Version 1.230
    Run by Chissamann on 01.10.2008 at 11:06

    Microsoft Windows XP [Version 5.1.2600]
    Running From: D:\SDFix

    Checking Services :


    Restoring Default Security Values
    Restoring Default Hosts File

    Rebooting


    Checking Files :

    No Trojan Files Found






    Removing Temp Files

    ADS Check :



    Final Check :

    catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-01 11:12:28
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden services & system hive ...

    scanning hidden registry entries ...

    scanning hidden files ...

    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 0


    Remaining Services :




    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "D:\\Program Files\\MSN Messenger\\msnmsgr.exe"="D:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
    "C:\\Programs\\utorrent\\utorrent.exe"="C:\\Programs\\utorrent\\utorrent.exe:*:Enabled:æTorrent"
    "C:\\Programs\\Utorent\\utorrent.exe"="C:\\Programs\\Utorent\\utorrent.exe:*:Enabled:æTorrent"
    "D:\\Program Files\\uTorrent\\utorrent.exe"="D:\\Program Files\\uTorrent\\utorrent.exe:*:Enabled:æTorrent"
    "D:\\Program Files\\Sony Ericsson\\Update Service\\Update Service.exe"="D:\\Program Files\\Sony Ericsson\\Update Service\\Update Service.exe:*:Enabled:Update Service"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
    "D:\\WINDOWS\\system32\\dplaysvr.exe"="D:\\WINDOWS\\system32\\dplaysvr.exe:*:Disabled:Microsoft DirectPlay Helper"
    "D:\\Program Files\\Activision Value\\WSOP 2008\\WSOPBFTB.exe"="D:\\Program Files\\Activision Value\\WSOP 2008\\WSOPBFTB.exe:*:Enabled:WSOPBFTB"
    "D:\\Program Files\\EA Games\\Command and Conquer Generals\\game.dat"="D:\\Program Files\\EA Games\\Command and Conquer Generals\\game.dat:*:Disabled:game"
    "D:\\Program Files\\MSN Messenger\\Phone\\Skype.exe"="D:\\Program Files\\MSN Messenger\\Phone\\Skype.exe:*:Enabled:Skype"
    "D:\\Documents and Settings\\Chissamann\\Desktop\\Age of empire\\Age of Empires II\\empires2.exe"="D:\\Documents and Settings\\Chissamann\\Desktop\\Age of empire\\Age of Empires II\\empires2.exe:*:Disabled:Age of Empires II"
    "D:\\Documents and Settings\\Chissamann\\Desktop\\Age of empire\\Age of Empires II\\age2_x1.exe"="D:\\Documents and Settings\\Chissamann\\Desktop\\Age of empire\\Age of Empires II\\age2_x1.exe:*:Disabled:Age of Empires II Expansion"
    "C:\\Programs\\Age of empire\\Age of Empires II\\age2_x1.exe"="C:\\Programs\\Age of empire\\Age of Empires II\\age2_x1.exe:*:Disabled:Age of Empires II Expansion"
    "D:\\Program Files\\BitTorrent\\bittorrent.exe"="D:\\Program Files\\BitTorrent\\bittorrent.exe:*:Disabled:BitTorrent"
    "D:\\Program Files\\Steam\\steamapps\\toddi90\\counter-strike source\\hl2.exe"="D:\\Program Files\\Steam\\steamapps\\toddi90\\counter-strike source\\hl2.exe:*:Disabled:hl2"
    "D:\\WINDOWS\\system32\\sessmgr.exe"="D:\\WINDOWS\\system32\\sessmgr.exe:*:Disabled:mad:xpsp2res.dll,-22019"
    "C:\\Programs\\VLC\\vlc.exe"="C:\\Programs\\VLC\\vlc.exe:*:Disabled:VLC media player"
    "D:\\Program Files\\MSN Messenger\\livecall.exe"="D:\\Program Files\\MSN Messenger\\livecall.exe:*:Disabled:Windows Live Messenger 8.1 (Phone)"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "D:\\Program Files\\MSN Messenger\\msnmsgr.exe"="D:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
    "D:\\Program Files\\MSN Messenger\\livecall.exe"="D:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"

    Remaining Files :



    Files with Hidden Attributes :

    Wed 4 Aug 2004 60,416 A.SH. --- "D:\Program Files\Outlook Express\msimn.exe"
    Thu 14 Aug 2008 1,429,840 A.SHR --- "D:\Program Files\Spybot - Search & Destroy\SDUpdate.exe"
    Wed 30 Jul 2008 4,891,984 A.SHR --- "D:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
    Mon 18 Aug 2008 1,832,272 A.SHR --- "D:\Program Files\TeaTimer (Spybot - Search & Destroy)\TeaTimer.exe"
    Tue 30 Sep 2008 10,698 A.SH. --- "D:\WINDOWS\system32\KGyGaAvL.sys"
    Thu 3 Nov 2005 4,348 A.SH. --- "D:\Documents and Settings\All Users\DRM\DRMv1.bak"
    Thu 3 Nov 2005 401 A.SH. --- "D:\Documents and Settings\All Users\DRM\DRMv16.bak"
    Sat 5 Jan 2008 0 A.SH. --- "D:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"

    Finished!



    ComboFix 08-09-28.05 - Chissamann 2008-10-01 11:19:18.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.151 [GMT 2:00]
    Running from: D:\Documents and Settings\Chissamann\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    D:\WINDOWS\system32\dao350.dll

    .
    ((((((((((((((((((((((((( Files Created from 2008-09-01 to 2008-10-01 )))))))))))))))))))))))))))))))
    .

    2008-10-01 11:03 . 2008-10-01 11:03 <DIR> d-------- D:\WINDOWS\ERUNT
    2008-10-01 10:57 . 2008-10-01 11:15 <DIR> d-------- D:\SDFix
    2008-09-30 18:09 . 2008-09-30 18:09 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\GlarySoft
    2008-09-30 18:07 . 2008-09-30 18:07 <DIR> d-------- D:\Program Files\Glary Utilities
    2008-09-30 18:07 . 2008-09-30 18:07 <DIR> d-------- D:\Program Files\AskBarDis
    2008-09-30 17:47 . 2008-09-30 17:47 <DIR> d-------- D:\Program Files\IObit
    2008-09-30 16:31 . 2008-09-30 16:31 <DIR> d-------- D:\Program Files\Malwarebytes' Anti-Malware
    2008-09-30 16:31 . 2008-09-30 16:31 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Malwarebytes
    2008-09-30 16:31 . 2008-09-30 16:31 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\Malwarebytes
    2008-09-30 16:31 . 2008-09-10 00:04 38,528 --a------ D:\WINDOWS\system32\drivers\mbamswissarmy.sys
    2008-09-30 16:31 . 2008-09-10 00:03 17,200 --a------ D:\WINDOWS\system32\drivers\mbam.sys
    2008-09-30 16:28 . 2008-09-30 16:28 <DIR> d-------- D:\Program Files\Trend Micro
    2008-09-30 16:05 . 2003-11-16 03:33 344,064 -ra------ D:\WINDOWS\system32\w22NCPA.dll
    2008-09-30 11:19 . 2008-10-01 10:49 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\uTorrent
    2008-09-25 12:35 . 2008-09-25 12:35 <DIR> d-------- D:\Program Files\MSXML 6.0
    2008-09-25 00:41 . 2008-09-25 00:41 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Logitech
    2008-09-25 00:41 . 2008-09-25 00:41 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\LogiShrd
    2008-09-25 00:40 . 2008-09-25 00:40 0 --ah----- D:\WINDOWS\system32\drivers\MsftWdf_Kernel_01005_Coinstaller_Critical.Wdf
    2008-09-25 00:40 . 2008-09-25 00:40 0 --ah----- D:\WINDOWS\system32\drivers\Msft_Kernel_LUsbFilt_01005.Wdf
    2008-09-25 00:40 . 2008-09-25 00:40 0 --ah----- D:\WINDOWS\system32\drivers\Msft_Kernel_LMouFilt_01005.Wdf
    2008-09-25 00:38 . 2008-05-02 02:38 301,656 --a------ D:\WINDOWS\system32\BtCoreIf.dll
    2008-09-25 00:37 . 2008-09-25 00:38 <DIR> d-------- D:\Program Files\Common Files\Logishrd
    2008-09-25 00:37 . 2008-09-25 00:37 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\Logitech
    2008-09-25 00:37 . 2008-05-02 02:39 170,512 --a------ D:\WINDOWS\system32\kemutb.dll
    2008-09-25 00:37 . 2008-05-02 02:39 145,936 --a------ D:\WINDOWS\system32\KemUtil.dll
    2008-09-25 00:37 . 2008-05-02 02:40 117,264 --a------ D:\WINDOWS\system32\KemWnd.dll
    2008-09-25 00:37 . 2008-05-02 02:40 84,496 --a------ D:\WINDOWS\system32\KemXML.dll
    2008-09-25 00:33 . 2008-09-25 00:33 <DIR> d-------- D:\Program Files\Realtek
    2008-09-25 00:33 . 2008-02-25 20:54 105,088 -ra------ D:\WINDOWS\system32\drivers\Rtnicxp.sys
    2008-09-25 00:01 . 2008-09-25 00:01 <DIR> d-------- D:\WINDOWS\system32\config\systemprofile\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\NetworkService\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\LocalService\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\Guest\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\Administrator\Application Data\Intel
    2008-09-24 23:57 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\Intel
    2008-09-24 23:39 . 2006-08-01 15:02 49,152 --a------ D:\WINDOWS\system32\ChCfg.exe
    2008-09-24 23:38 . 2008-09-24 23:38 <DIR> d-------- D:\Program Files\Realtek AC97
    2008-09-24 23:36 . 2008-05-01 16:35 53,248 --a------ D:\WINDOWS\system32\CSVer.dll
    2008-09-24 23:34 . 2008-09-24 23:34 <DIR> d-------- D:\Intel
    2008-09-23 01:00 . 2008-06-10 02:32 73,728 --a------ D:\WINDOWS\system32\javacpl.cpl
    2008-09-18 10:19 . 2008-09-18 10:31 <DIR> d-------- D:\Program Files\Spybot - Search & Destroy
    2008-09-18 10:17 . 2008-09-18 10:17 <DIR> d-------- D:\Program Files\TeaTimer (Spybot - Search & Destroy)
    2008-09-17 00:45 . 2008-09-17 00:45 23,392 --a------ D:\WINDOWS\system32\nscompat.tlb
    2008-09-17 00:45 . 2008-09-17 00:45 16,832 --a------ D:\WINDOWS\system32\amcompat.tlb
    2008-09-16 23:26 . 2008-09-17 00:41 <DIR> d-------- D:\Program Files\Windows Media Connect 2

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-10-01 08:47 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\Skype
    2008-10-01 08:43 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\SiteAdvisor
    2008-09-30 16:12 10,698 --sha-w D:\WINDOWS\system32\KGyGaAvL.sys
    2008-09-30 13:57 --------- d-----w D:\Program Files\Intel
    2008-09-29 22:17 --------- d--h--w D:\Program Files\InstallShield Installation Information
    2008-09-24 21:33 --------- d-----w D:\Program Files\Common Files\Logitech
    2008-09-22 23:00 --------- d-----w D:\Program Files\Java
    2008-09-18 08:44 --------- d-----w D:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-08-25 09:52 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\AdobeUM
    2008-08-14 21:40 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\ATI
    2008-08-14 21:40 --------- d-----w D:\Documents and Settings\All Users\Application Data\ATI
    2008-08-14 20:21 --------- d-----w D:\Program Files\Common Files\ATI Technologies
    2008-08-14 20:21 --------- d-----w D:\Program Files\ATI Technologies
    2008-08-14 04:16 --------- d-----w D:\Documents and Settings\All Users\Application Data\WinZip
    2008-08-14 04:02 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\Uniblue
    2008-07-18 20:10 94,920 ----a-w D:\WINDOWS\system32\cdm.dll
    2008-07-18 20:10 53,448 ----a-w D:\WINDOWS\system32\wuauclt.exe
    2008-07-18 20:10 45,768 ----a-w D:\WINDOWS\system32\wups2.dll
    2008-07-18 20:10 36,552 ----a-w D:\WINDOWS\system32\wups.dll
    2008-07-18 20:09 563,912 ----a-w D:\WINDOWS\system32\wuapi.dll
    2008-07-18 20:09 325,832 ----a-w D:\WINDOWS\system32\wucltui.dll
    2008-07-18 20:09 205,000 ----a-w D:\WINDOWS\system32\wuweb.dll
    2008-07-18 20:09 1,811,656 ----a-w D:\WINDOWS\system32\wuaueng.dll
    2008-07-18 20:07 270,880 ----a-w D:\WINDOWS\system32\mucltui.dll
    2008-07-18 20:07 210,976 ----a-w D:\WINDOWS\system32\muweb.dll
    2008-07-07 20:32 253,952 ----a-w D:\WINDOWS\system32\es.dll
    2006-11-17 10:38 507 ----a-w D:\Program Files\PartyPoker.net.lnk
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MsnMsgr"="D:\Program Files\MSN Messenger\MsnMsgr.Exe" [2007-01-19 5674352]
    "googletalk"="D:\Program Files\Google\Google Talk\googletalk.exe" [2007-01-01 3739648]
    "Skype"="D:\Program Files\MSN Messenger\Phone\Skype.exe" [2007-09-13 22880040]
    "SpybotSD TeaTimer"="D:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-08-18 1832272]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SynTPEnh"="D:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2004-01-09 491520]
    "avast!"="D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2008-07-19 78008]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="D:\WINDOWS\System32\ctfmon.exe" [2004-08-04 15360]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
    "NoResolveSearch"= 1 (0x1)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
    2008-05-02 02:42 72208 d:\Program Files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.enc"= ITIG726.acm
    "msacm.divxa32"= DivXa32.acm
    "VIDC.ACDV"= ACDV.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
    @=""

    [HKLM\~\startupfolder\D:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech SetPoint.lnk]
    backup=D:\WINDOWS\pss\Logitech SetPoint.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CplBCL50]
    --a------ 2004-03-02 11:45 401408 D:\Program Files\EzButton\CplBCL50.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
    -ra------ 2001-07-09 11:50 155648 D:\WINDOWS\system32\NeroCheck.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\StartCCC]
    --a------ 2008-01-21 12:17 61440 D:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    --a------ 2008-06-10 04:27 144784 D:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPLpr]
    --a------ 2004-01-09 08:09 98304 D:\Program Files\Synaptics\SynTP\SynTPLpr.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Kernel and Hardware Abstraction Layer]
    --a------ 2008-02-29 03:12 76304 D:\WINDOWS\KHALMNPR.Exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Logitech Utility]
    --------- 2003-12-11 09:50 20992 D:\WINDOWS\LOGI_MWX.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMan]
    --a------ 2007-04-16 15:28 577536 D:\WINDOWS\soundman.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "Ati HotKey Poller"=2 (0x2)
    "usnjsvc"=3 (0x3)
    "PnkBstrB"=3 (0x3)
    "Pml Driver HPZ12"=3 (0x3)
    "Norman ZANDA"=2 (0x2)
    "IDriverT"=3 (0x3)
    "ose"=3 (0x3)
    "Adobe LM Service"=3 (0x3)
    "LBTServ"=3 (0x3)
    "WudfSvc"=2 (0x2)
    "ATI Smart"=2 (0x2)
    "xmlprov"=3 (0x3)
    "WZCSVC"=2 (0x2)
    "Spooler"=2 (0x2)

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
    "Windows Automatical Updater"=dcz.exe
    "LogitechSoftwareUpdate"="D:\Program Files\Logitech\Video\ManifestEngine.exe" boot

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
    "LVCOMSX"=D:\WINDOWS\System32\LVCOMSX.EXE
    "HP Component Manager"="D:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
    "HP Software Update"=D:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    "Windows Automatical Updater"=dcz.exe
    "QuickTime Task"="D:\Program Files\QuickTime\qttask.exe" -atboottime
    "SunJavaUpdateSched"=D:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    "ATIModeChange"=Ati2mdxx.exe
    "LogitechVideoTray"=D:\Program Files\Logitech\Video\LogiTray.exe
    "Logitech Hardware Abstraction Layer"=KHALMNPR.EXE
    "AGRSMMSG"=AGRSMMSG.exe
    "LtMoh"=D:\Program Files\ltmoh\Ltmoh.exe
    "NeroFilterCheck"=D:\WINDOWS\system32\NeroCheck.exe
    "KernelFaultCheck"=%systemroot%\system32\dumprep 0 -k
    "<NO NAME>"=
    "LogitechVideoRepair"=D:\Program Files\Logitech\Video\ISStart.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices-]
    "Windows Automatical Updater"=dcz.exe

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "D:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
    "D:\\Program Files\\uTorrent\\utorrent.exe"=
    "D:\\Program Files\\Sony Ericsson\\Update Service\\Update Service.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "D:\\WINDOWS\\system32\\dplaysvr.exe"=
    "D:\\Program Files\\Activision Value\\WSOP 2008\\WSOPBFTB.exe"=
    "D:\\WINDOWS\\system32\\sessmgr.exe"=
    "C:\\Programs\\VLC\\vlc.exe"=
    "D:\\Program Files\\MSN Messenger\\livecall.exe"=
    "D:\\Program Files\\MSN Messenger\\Phone\\Skype.exe"=

    R1 aswSP;avast! Self Protection;D:\WINDOWS\system32\drivers\aswSP.sys [2008-07-19 78416]
    R2 aswFsBlk;aswFsBlk;D:\WINDOWS\system32\DRIVERS\aswFsBlk.sys [2008-07-19 20560]
    R3 WBSD;Winbond Secure Digital Storage (SD/MMC) Device Driver;D:\WINDOWS\system32\Drivers\WBSD.SYS [2003-03-20 25856]

    *Newly Created Service* - PROCEXP90
    .
    Contents of the 'Scheduled Tasks' folder
    .
    .
    ------- Supplementary Scan -------
    .
    FireFox -: Profile - D:\Documents and Settings\Chissamann\Application Data\Mozilla\Firefox\Profiles\06dze729.default\
    FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.psy.ku.dk/
    FF -: plugin - D:\Program Files\Adobe\Acrobat 7.0\Reader\browser\nppdf32.dll
    FF -: plugin - D:\Program Files\Mozilla Firefox\plugins\NPAdbESD.dll
    .

    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-01 11:21:30
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2008-10-01 11:23:17
    ComboFix-quarantined-files.txt 2008-10-01 09:23:12

    Pre-Run: 4 518 559 744 bytes free
    Post-Run: 4,509,048,832 bytes free

    209 --- E O F --- 2008-09-25 10:35:21





    _SetupPoker.exe\data001;C:\Poker\Titan Poker\_SetupPoker.exe;Adware.Casino; _SetupPoker.exe\data002;C:\Poker\Titan Poker\_SetupPoker.exe;Adware.Casino; _SetupPoker.exe\data003;C:\Poker\Titan Poker\_SetupPoker.exe;Adware.Casino; _SetupPoker.exe;C:\Poker\Titan Poker;Arkiv inneholder infiserte objekter;Flyttet. A0178736.exe\data001;C:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178736.exe;Adware.Casino; A0178736.exe\data002;C:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178736.exe;Adware.Casino; A0178736.exe\data003;C:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178736.exe;Adware.Casino; A0178736.exe;C:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Arkiv inneholder infiserte objekter;Flyttet. RegUBP2b-Chissamann.reg;D:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Snapshots2;Trojan.StartPage.1505;Slettet. ComboFix.exe\32788R22FWJFW\C.bat;D:\Documents and Settings\Chissamann\desktop\ComboFix.exe;Sannsynlighvis BATCH.Virus; ComboFix.exe\32788R22FWJFW\List-C.bat;D:\Documents and Settings\Chissamann\desktop\ComboFix.exe;Sannsynlighvis BATCH.Virus; ComboFix.exe\32788R22FWJFW\psexec.cfexe;D:\Documents and Settings\Chissamann\desktop\ComboFix.exe;Program.PsExec.171; ComboFix.exe;D:\Documents and Settings\Chissamann\desktop;Arkiv inneholder infiserte objekter;Flyttet. Process.exe;D:\SDFix\apps;Tool.Prockill; A0178585.bat;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Sannsynlighvis BATCH.Virus; A0178588.exe\SDFix\apps\Process.exe;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178588.exe;Tool.Prockill; A0178588.exe;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Arkiv inneholder infiserte objekter;Flyttet. A0178592.bat;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Sannsynlighvis BATCH.Virus; A0178641.bat;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Sannsynlighvis BATCH.Virus; A0178646.bat;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Sannsynlighvis BATCH.Virus; A0178713.reg;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Trojan.StartPage.1505;Slettet. A0178737.exe\32788R22FWJFW\C.bat;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178737.exe;Sannsynlighvis BATCH.Virus; A0178737.exe\32788R22FWJFW\List-C.bat;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178737.exe;Sannsynlighvis BATCH.Virus; A0178737.exe\32788R22FWJFW\psexec.cfexe;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955\A0178737.exe;Program.PsExec.171; A0178737.exe;D:\System Volume Information\_restore{DE6B9DF3-468C-4A5B-B649-D51CE48724B2}\RP955;Arkiv inneholder infiserte objekter;Flyttet.
    Translation: Flyttet = Moved, Slettet = Deleted



    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 00:18:13, on 02.10.2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16674)
    Boot mode: Normal

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    D:\Program Files\Alwil Software\Avast4\ashServ.exe
    D:\WINDOWS\Explorer.EXE
    D:\WINDOWS\System32\svchost.exe
    D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    D:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    D:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    D:\Program Files\ATI Technologies\ATI.ACE\Core-Static\mom.exe
    D:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
    D:\WINDOWS\System32\LVComsX.exe
    D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.unimelb.edu.au/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - HKLM\..\Run: [SynTPEnh] D:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [avast!] D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKCU\..\Run: [MsnMsgr] "D:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [googletalk] "D:\Program Files\Google\Google Talk\googletalk.exe" /autostart
    O4 - HKCU\..\Run: [Skype] "D:\Program Files\MSN Messenger\Phone\Skype.exe" /nosplash /minimized
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] D:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\ctfmon.exe (User 'Default user')
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe
    O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\poker\Party\PartyPoker\RunApp.exe
    O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\poker\Party\PartyPoker\RunApp.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - D:\Program Files\PartyPoker.net\partypokernet.exe (file missing)
    O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - D:\Program Files\PartyPoker.net\partypokernet.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O16 - DPF: ImageUploader - http://www.direktefoto.no/df/Aurigma/ImageUploader.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1126801348456
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1142168542307
    O16 - DPF: {D8575CE3-3432-4540-88A9-85A1325D3375} (e-Safekey) - https://netbank.danskebank.dk/html/activex/e-Safekey/DB/e-Safekey.cab
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CS3\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - D:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashWebSv.exe

    --
    End of file - 6024 bytes


    Please help me solve this Khazars!!! What should I do?

    Can I use Zonealarm instead of Comodo firewall? Isnt Windows firewall enough?

    Thanks...
     
  4. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    yes you can use Z Alarm!



    NOTE: If you have downloaded ComboFix previously please delete that
    version and download it again!


    Please visit this webpage for instructions for downloading and running
    ComboFix.


    http://www.bleepingcomputer.com/combofix/how-to-use-combofix


    Post the log from ComboFix when you've accomplished that along with a
    new HijackThis log.


    Download ComboFix from
    Here
    or
    Here
    to your Desktop.

    Reboot to Safe mode:

    Restart your computer and begin tapping the F8 key on your keyboard just
    before Windows starts to load. If done right a Windows Advanced Options menu
    will appear. Select the Safe Mode option and press Enter.

    Perform the following actions in Safe Mode.
    • Double click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Post that log and a
      HiJackthis log in your next reply
    Note: Do not mouseclick combofix's window while its
    running. That may cause it to stall



    Download UnHookExec.inf to your Desktop.
    Right-Click on UnHookExec.inf and click on Install.
    It doen't display any notice or boxes, don't worry it worked.

    http://securityresponse.symantec.com/avcenter/UnHookExec.inf


    Go to Start ---> Run ---> Type ComboFix /u and press Enter. This will
    uninstall ComboFix.
    _____________________________________________________________________



    * Copy the entire contents of the Quote Box below to Notepad.
    * Name the file as CFScript.txt
    * Change the Save as Type to All Files
    * and Save it on the desktop


    Save this as CFScript.txt, in the same location as ComboFix.exe


    [​IMG]

    Refering to the picture above, drag CFScript into ComboFix.exe

    When finished, it shall produce a log for you at "C:\ComboFix.txt"

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause
    it to stall




    Download Superantispyware (SAS):

    http://www.superantispyware.com/supe....html?rid=3132


    Once downloaded and installed update the defintions
    and then run a full system scan quarantine what it finds!


    * Double-click SUPERAntiSypware.exe and use the default settings for
    installation.
    * An icon will be created on your desktop. Double-click that icon to launch
    the program.
    * If asked to update the program definitions, click "Yes". If not, update
    the definitions before scanning by selecting "Check for Updates". (If you
    encounter any problems while downloading the updates, manually download and
    unzip them from here.)

    http://www.superantispyware.com/definitions.html

    * Under "Configuration and Preferences", click the Preferences button.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all
    others unchecked):
    o Close browsers before scanning.
    o Scan for tracking cookies.
    o Terminate memory threats before quarantining.
    * Click the "Close" button to leave the control center screen.
    * Back on the main screen, under "Scan for Harmful Software" click Scan your
    computer.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, under "Complete Scan", choose Perform Complete Scan.
    * Click "Next" to start the scan. Please be patient while it scans your
    computer.
    * After the scan is complete, a Scan Summary box will appear with
    potentially harmful items that were detected. Click "OK".
    * Make sure everything has a checkmark next to it and click "Next".
    * A notification will appear that "Quarantine and Removal is Complete".
    Click "OK" and then click the "Finish" button to return to the main menu.
    * If asked if you want to reboot, click "Yes".
    * To retrieve the removal information after reboot, launch SUPERAntispyware
    again.
    o Click Preferences, then click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o If there are several logs, click the current dated log and press View log.
    A text file will open in your default text editor.
    o Please copy and paste the Scan Log results in your next reply.
    * Click Close to exit the program.




    Please download Malwarebytes Anti-Malware and save it to your desktop. alternate download link 1 alternate download link 2

    http://malwarebytes.gt500.org/mbam-setup.exe

    http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html

    * Make sure you are connected to the Internet.
    * Double-click on Download_mbam-setup.exe to install the application.
    * When the installation begins, follow the prompts and do not make any changes to default settings.
    * When installation has finished, make sure you leave both of these checked:
    o Update Malwarebytes' Anti-Malware
    o Launch Malwarebytes' Anti-Malware
    * Then click Finish.
    * MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
    * On the Scanner tab:
    o Make sure the "Perform Quick Scan" option is selected.
    o Then click on the Scan button.
    * If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
    * The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
    * When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    * Click OK to close the message box and continue with the removal process.
    * Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
    * Make sure that everything is checked, and click Remove Selected.
    * When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
    * The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
    * Copy and paste the contents of that report in your next reply with a new hijackthis log.

    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.



    Note: this is a stand alone, it doesn't install to start/programmes.

    Download Mwav,

    http://www.spywareinfo.dk/download/mwav.exe


    double click on it and it will extract to C:\kaspersky. Click
    on the kaspersky folder and click on Kavupd, a black dos window will open
    and it will update the programme for you, be patient it will take 5-10
    minutes to download the new definitions. Once it's updated, click on
    mwavscan
    to launch the programme.

    Use the defaults of:

    Memory
    startup folders
    Registry
    system folders
    services

    Choose drive , all drives and, click scan all files
    and then click scan/clean. After it finishes scanning and cleaning post
    the log here with a new hijack this log.

    Note: this is a very thorough scanner, it might take anything up to an hour
    or more, depending on how many drives you have and how badly infected your
    pc is.



    Highlight the section of Mwav which says " virus log information "
    which lists infected items and hold CTRL + C to Copy then paste it here. The
    I just need the infected items list.



    Post a new hijack this, the Mwav scan log, the combo, the malwarebyte and the super log!
     
  5. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    I'm Confused! I just posted new HijackThis, SDFix, COMBO and Dr.Web logs. How do you interpret those? Any problems?

    Thanks for quick replies!
     
  6. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    oops posted the wrong bit!





    * Copy the entire contents of the Quote Box below to Notepad.
    * Name the file as CFScript.txt
    * Change the Save as Type to All Files
    * and Save it on the desktop


    Save this as CFScript.txt, in the same location as ComboFix.exe


    [​IMG]

    Refering to the picture above, drag CFScript into ComboFix.exe

    When finished, it shall produce a log for you at "C:\ComboFix.txt"

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause
    it to stall




    post another hijakc this, the combo, the malware, the super and the Mwav log!
     
  7. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    Thank you for your replies!

    Sorry for taking a while to post reply, but my computer has been a bit sick, restarting itself and being slow, I really hope we can solve this problem!

    I discovered a scheduled task I haven't set, may it be a part of the problem? ''scheduled task Hide drv settings.exe''. I have deleted it now.

    Here are the logs from ComboFix (after using the script as you said), Malwarebytes, and HiJackThis:

    ComboFix 08-10-11.04 - Chissamann 2008-10-12 17:00:28.3 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.210 [GMT 2:00]
    Running from: D:\Documents and Settings\Chissamann\Desktop\ComboFix.exe
    Command switches used :: D:\Documents and Settings\Chissamann\Desktop\CFScript.txt
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((( Files Created from 2008-09-12 to 2008-10-12 )))))))))))))))))))))))))))))))
    .

    2008-10-09 23:02 . 2008-10-09 23:02 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\dvdcss
    2008-10-03 15:59 . 2008-10-03 15:59 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\BVRP Software
    2008-10-02 23:43 . 2008-10-02 23:46 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Command & Conquer 3 Tiberium Wars
    2008-10-02 23:42 . 2008-10-02 23:42 <DIR> dr-h----- D:\Documents and Settings\Chissamann\Application Data\SecuROM
    2008-10-02 23:42 . 2008-10-02 23:42 98,304 --a------ D:\WINDOWS\system32CmdLineExt.dll
    2008-10-02 14:23 . 2008-10-12 17:04 3,270,688 --ahs---- D:\WINDOWS\system32\drivers\fidbox.dat
    2008-10-02 14:23 . 2008-10-12 17:04 39,800 --ahs---- D:\WINDOWS\system32\drivers\fidbox.idx
    2008-10-02 14:19 . 2008-10-02 14:19 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\MailFrontier
    2008-10-02 14:19 . 2008-07-09 09:05 75,248 --a------ D:\WINDOWS\zllsputility.exe
    2008-10-02 14:19 . 2004-04-27 04:40 11,264 --a------ D:\WINDOWS\system32\SpOrder.dll
    2008-10-02 14:19 . 2008-10-02 14:21 4,212 ---h----- D:\WINDOWS\system32\zllictbl.dat
    2008-10-02 14:18 . 2008-10-02 14:18 <DIR> d-------- D:\Program Files\Zone Labs
    2008-10-02 14:17 . 2008-10-12 16:57 <DIR> d-------- D:\WINDOWS\Internet Logs
    2008-10-01 11:43 . 2008-10-01 17:46 <DIR> d-------- D:\Documents and Settings\Chissamann\DoctorWeb
    2008-10-01 11:03 . 2008-10-01 11:03 <DIR> d-------- D:\WINDOWS\ERUNT
    2008-10-01 10:57 . 2008-10-01 11:15 <DIR> d-------- D:\SDFix
    2008-09-30 18:09 . 2008-09-30 18:09 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\GlarySoft
    2008-09-30 18:07 . 2008-09-30 18:07 <DIR> d-------- D:\Program Files\Glary Utilities
    2008-09-30 17:47 . 2008-09-30 17:47 <DIR> d-------- D:\Program Files\IObit
    2008-09-30 16:31 . 2008-09-30 16:31 <DIR> d-------- D:\Program Files\Malwarebytes' Anti-Malware
    2008-09-30 16:31 . 2008-09-30 16:31 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Malwarebytes
    2008-09-30 16:31 . 2008-09-30 16:31 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\Malwarebytes
    2008-09-30 16:31 . 2008-09-10 00:04 38,528 --a------ D:\WINDOWS\system32\drivers\mbamswissarmy.sys
    2008-09-30 16:31 . 2008-09-10 00:03 17,200 --a------ D:\WINDOWS\system32\drivers\mbam.sys
    2008-09-30 16:28 . 2008-09-30 16:28 <DIR> d-------- D:\Program Files\Trend Micro
    2008-09-30 16:05 . 2003-11-16 03:33 344,064 -ra------ D:\WINDOWS\system32\w22NCPA.dll
    2008-09-30 11:19 . 2008-10-09 21:21 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\uTorrent
    2008-09-25 12:35 . 2008-09-25 12:35 <DIR> d-------- D:\Program Files\MSXML 6.0
    2008-09-25 00:41 . 2008-09-25 00:41 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Logitech
    2008-09-25 00:41 . 2008-09-25 00:41 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\LogiShrd
    2008-09-25 00:40 . 2008-09-25 00:40 0 --ah----- D:\WINDOWS\system32\drivers\MsftWdf_Kernel_01005_Coinstaller_Critical.Wdf
    2008-09-25 00:40 . 2008-09-25 00:40 0 --ah----- D:\WINDOWS\system32\drivers\Msft_Kernel_LUsbFilt_01005.Wdf
    2008-09-25 00:40 . 2008-09-25 00:40 0 --ah----- D:\WINDOWS\system32\drivers\Msft_Kernel_LMouFilt_01005.Wdf
    2008-09-25 00:38 . 2008-05-02 02:38 301,656 --a------ D:\WINDOWS\system32\BtCoreIf.dll
    2008-09-25 00:37 . 2008-09-25 00:38 <DIR> d-------- D:\Program Files\Common Files\Logishrd
    2008-09-25 00:37 . 2008-09-25 00:37 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\Logitech
    2008-09-25 00:37 . 2008-05-02 02:39 170,512 --a------ D:\WINDOWS\system32\kemutb.dll
    2008-09-25 00:37 . 2008-05-02 02:39 145,936 --a------ D:\WINDOWS\system32\KemUtil.dll
    2008-09-25 00:37 . 2008-05-02 02:40 117,264 --a------ D:\WINDOWS\system32\KemWnd.dll
    2008-09-25 00:37 . 2008-05-02 02:40 84,496 --a------ D:\WINDOWS\system32\KemXML.dll
    2008-09-25 00:33 . 2008-09-25 00:33 <DIR> d-------- D:\Program Files\Realtek
    2008-09-25 00:33 . 2008-02-25 20:54 105,088 -ra------ D:\WINDOWS\system32\drivers\Rtnicxp.sys
    2008-09-25 00:01 . 2008-09-25 00:01 <DIR> d-------- D:\WINDOWS\system32\config\systemprofile\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\NetworkService\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\LocalService\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\Guest\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\Chissamann\Application Data\Intel
    2008-09-25 00:01 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\Administrator\Application Data\Intel
    2008-09-24 23:57 . 2008-09-30 15:57 <DIR> d-------- D:\Documents and Settings\All Users\Application Data\Intel
    2008-09-24 23:39 . 2006-08-01 15:02 49,152 --a------ D:\WINDOWS\system32\ChCfg.exe
    2008-09-24 23:38 . 2008-09-24 23:38 <DIR> d-------- D:\Program Files\Realtek AC97
    2008-09-24 23:36 . 2008-05-01 16:35 53,248 --a------ D:\WINDOWS\system32\CSVer.dll
    2008-09-24 23:34 . 2008-09-24 23:34 <DIR> d-------- D:\Intel
    2008-09-23 01:00 . 2008-06-10 02:32 73,728 --a------ D:\WINDOWS\system32\javacpl.cpl
    2008-09-18 10:19 . 2008-09-18 10:31 <DIR> d-------- D:\Program Files\Spybot - Search & Destroy
    2008-09-18 10:17 . 2008-09-18 10:17 <DIR> d-------- D:\Program Files\TeaTimer (Spybot - Search & Destroy)
    2008-09-17 00:45 . 2008-09-17 00:45 23,392 --a------ D:\WINDOWS\system32\nscompat.tlb
    2008-09-17 00:45 . 2008-09-17 00:45 16,832 --a------ D:\WINDOWS\system32\amcompat.tlb
    2008-09-16 23:26 . 2008-09-17 00:41 <DIR> d-------- D:\Program Files\Windows Media Connect 2

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-10-12 15:09 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\Skype
    2008-10-12 14:55 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\SiteAdvisor
    2008-09-30 13:57 --------- d-----w D:\Program Files\Intel
    2008-09-29 22:17 --------- d--h--w D:\Program Files\InstallShield Installation Information
    2008-09-24 21:33 --------- d-----w D:\Program Files\Common Files\Logitech
    2008-09-22 23:00 --------- d-----w D:\Program Files\Java
    2008-09-18 08:44 --------- d-----w D:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-08-25 09:52 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\AdobeUM
    2008-08-14 21:40 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\ATI
    2008-08-14 21:40 --------- d-----w D:\Documents and Settings\All Users\Application Data\ATI
    2008-08-14 20:21 --------- d-----w D:\Program Files\Common Files\ATI Technologies
    2008-08-14 20:21 --------- d-----w D:\Program Files\ATI Technologies
    2008-08-14 04:16 --------- d-----w D:\Documents and Settings\All Users\Application Data\WinZip
    2008-08-14 04:02 --------- d-----w D:\Documents and Settings\Chissamann\Application Data\Uniblue
    2006-11-17 10:38 507 ----a-w D:\Program Files\PartyPoker.net.lnk
    .

    ((((((((((((((((((((((((((((( [email protected]_11.22.49.23 )))))))))))))))))))))))))))))))))))))))))
    .
    + 2008-10-02 21:39:02 33,982 ----a-r D:\WINDOWS\Installer\{DDEDAF6C-488E-4CDA-8276-1CCF5F3C5C32}\ARPPRODUCTICON.exe
    + 2008-10-02 21:39:02 40,960 ----a-r D:\WINDOWS\Installer\{DDEDAF6C-488E-4CDA-8276-1CCF5F3C5C32}\NewShortcut3_96B87C3D64854A7D96EBB2C8CB752619.exe
    + 2008-10-02 21:39:02 40,960 ----a-r D:\WINDOWS\Installer\{DDEDAF6C-488E-4CDA-8276-1CCF5F3C5C32}\NewShortcut31_96B87C3D64854A7D96EBB2C8CB752619.exe
    + 2007-07-19 13:10:28 127,768 ----a-w D:\WINDOWS\system32\drivers\klif.sys
    - 2008-09-30 16:12:34 10,698 --sha-w D:\WINDOWS\system32\KGyGaAvL.sys
    + 2008-10-02 22:58:20 10,698 --sha-w D:\WINDOWS\system32\KGyGaAvL.sys
    + 2008-07-09 07:05:08 796,048 ----a-w D:\WINDOWS\system32\libeay32_0.9.6l.dll
    + 2008-07-09 07:05:10 83,432 ----a-w D:\WINDOWS\system32\vsdata.dll
    + 2008-07-09 07:05:22 394,952 ----a-w D:\WINDOWS\system32\vsdatant.sys
    + 2008-07-09 07:05:10 157,160 ----a-w D:\WINDOWS\system32\vsinit.dll
    + 2008-07-09 07:05:10 103,912 ----a-w D:\WINDOWS\system32\vsmonapi.dll
    + 2008-07-09 07:05:10 275,944 ----a-w D:\WINDOWS\system32\vspubapi.dll
    + 2008-07-09 07:05:10 71,144 ----a-w D:\WINDOWS\system32\vsregexp.dll
    + 2008-07-09 07:05:12 472,552 ----a-w D:\WINDOWS\system32\vsutil.dll
    + 2008-07-09 07:05:12 46,568 ----a-w D:\WINDOWS\system32\vswmi.dll
    + 2008-07-09 07:05:12 99,816 ----a-w D:\WINDOWS\system32\vsxml.dll
    + 2008-07-09 07:05:12 83,432 ----a-w D:\WINDOWS\system32\zlcomm.dll
    + 2008-07-09 07:05:12 71,144 ----a-w D:\WINDOWS\system32\zlcommdb.dll
    + 2008-07-09 07:05:06 370,208 ----a-w D:\WINDOWS\system32\ZoneLabs\av.dll
    + 2007-05-30 22:03:30 65,248 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\bases\aphish.dat
    + 2006-06-30 12:47:36 21,568 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\bases\avcmhk4.dll
    + 2007-05-30 22:03:30 1,628 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\bases\pdmkl.dat
    + 2007-05-30 22:03:16 77,824 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\CKAHComm.dll
    + 2007-05-30 22:03:16 110,592 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\CKAHrule.dll
    + 2007-05-30 22:03:16 331,776 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\CKAHUM.dll
    + 2007-05-30 22:03:16 38,400 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\FSSync.dll
    + 2006-09-19 21:12:14 208,960 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\inv.dll
    + 2007-12-03 12:53:58 282,624 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\kave.dll
    + 2006-12-19 16:13:52 1,093,632 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\libeay32.dll
    + 2007-05-30 22:03:20 548,864 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\msvcp80.dll
    + 2007-05-30 22:03:20 626,688 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\msvcr80.dll
    + 2007-05-30 22:03:18 184,320 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\prloader.dll
    + 2007-05-30 22:03:22 90,112 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\prremote.dll
    + 2007-12-03 12:53:58 139,264 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\ScanningProcess.exe
    + 2006-12-19 16:13:52 200,704 ----a-w D:\WINDOWS\system32\ZoneLabs\avsys\ssleay32.dll
    + 2008-07-09 07:05:06 99,816 ----a-w D:\WINDOWS\system32\ZoneLabs\camupd.dll
    + 2004-01-30 10:35:08 813,568 ----a-w D:\WINDOWS\system32\ZoneLabs\dbghelp.dll
    + 2008-07-09 07:05:08 128,480 ----a-w D:\WINDOWS\system32\ZoneLabs\fbl.dll
    + 2008-07-09 07:05:08 38,376 ----a-w D:\WINDOWS\system32\ZoneLabs\featuremap.dll
    + 2008-07-09 07:05:08 321,016 ----a-w D:\WINDOWS\system32\ZoneLabs\imsecure.dll
    + 2008-07-09 07:05:24 288,144 ----a-w D:\WINDOWS\system32\ZoneLabs\lib\ConfigWizard.zip.dll
    + 2008-10-02 12:41:56 152,976 ----a-w D:\WINDOWS\system32\ZoneLabs\lib\licenseui.zip.dll
    + 2008-07-09 07:05:24 26,000 ----a-w D:\WINDOWS\system32\ZoneLabs\lib\zlsvc.zip.dll
    + 2008-07-09 07:05:24 1,361,296 ----a-w D:\WINDOWS\system32\ZoneLabs\lib\zpy.zip.dll
    + 2008-07-09 07:05:24 71,056 ----a-w D:\WINDOWS\system32\ZoneLabs\lib\zui.zip.dll
    + 2008-07-09 07:06:26 30,184 ----a-w D:\WINDOWS\system32\ZoneLabs\plugins\rpc_server\rpc_server.dll
    + 2008-07-09 07:06:26 30,216 ----a-w D:\WINDOWS\system32\ZoneLabs\plugins\vsmon_plugin\vsmon_plugin.dll
    + 2008-02-27 01:10:26 714,208 ----a-w D:\WINDOWS\system32\ZoneLabs\qrbase.dll
    + 2008-02-27 01:10:28 792,032 ----a-w D:\WINDOWS\system32\ZoneLabs\qrsrecl.dll
    + 2008-07-09 07:05:08 173,544 ----a-w D:\WINDOWS\system32\ZoneLabs\scheduler.dll
    + 2008-01-21 06:34:36 7,603,688 ----a-w D:\WINDOWS\system32\ZoneLabs\spyware.dat
    + 2008-02-27 01:10:32 1,504,736 ----a-w D:\WINDOWS\system32\ZoneLabs\srescan.dll
    + 2008-02-27 01:10:44 51,176 ----a-w D:\WINDOWS\system32\ZoneLabs\srescan.sys
    + 2008-07-09 07:05:10 456,168 ----a-w D:\WINDOWS\system32\ZoneLabs\ssleay32.dll
    + 2008-07-09 07:06:26 214,528 ----a-w D:\WINDOWS\system32\ZoneLabs\streamapi\httpblocker\httpblocker.dll
    + 2008-07-09 07:06:30 3,266,040 ----a-w D:\WINDOWS\system32\ZoneLabs\streamapi\imslsp\imslsp.dll
    + 2006-09-04 18:59:14 503,875 ----a-w D:\WINDOWS\system32\ZoneLabs\upd_core.dll
    + 2007-10-11 14:50:32 832,984 ----a-w D:\WINDOWS\system32\ZoneLabs\updating.dll
    + 2008-07-09 07:05:18 144,936 ----a-w D:\WINDOWS\system32\ZoneLabs\updclient.exe
    + 2007-01-11 15:31:06 286,787 ----a-w D:\WINDOWS\system32\ZoneLabs\updtrsdk.dll
    + 2008-07-09 07:05:10 108,008 ----a-w D:\WINDOWS\system32\ZoneLabs\vsavpro.dll
    + 2008-07-09 07:05:10 83,432 ----a-w D:\WINDOWS\system32\ZoneLabs\vsdb.dll
    + 2008-07-09 07:05:18 75,304 ----a-w D:\WINDOWS\system32\ZoneLabs\vsmon.exe
    + 2008-07-09 07:05:10 2,029,032 ----a-w D:\WINDOWS\system32\ZoneLabs\vsmondll.dll
    + 2008-07-09 07:05:12 1,361,384 ----a-w D:\WINDOWS\system32\ZoneLabs\vsruledb.dll
    + 2008-07-09 07:05:12 239,080 ----a-w D:\WINDOWS\system32\ZoneLabs\vsvault.dll
    + 2008-01-21 06:34:36 7,603,688 ----a-w D:\WINDOWS\system32\ZoneLabs\zlasdbup.dat
    + 2008-07-09 07:05:12 177,640 ----a-w D:\WINDOWS\system32\ZoneLabs\zlparser.dll
    + 2008-07-09 07:05:12 79,344 ----a-w D:\WINDOWS\system32\ZoneLabs\zlquarantine.dll
    + 2008-07-09 07:05:14 382,440 ----a-w D:\WINDOWS\system32\ZoneLabs\zlsre.dll
    + 2008-07-09 07:05:14 120,296 ----a-w D:\WINDOWS\system32\ZoneLabs\zlupdate.dll
    + 2008-07-09 07:05:16 1,086,952 ----a-w D:\WINDOWS\system32\zpeng24.dll
    + 2008-10-12 15:05:11 16,384 ----atw D:\WINDOWS\temp\Perflib_Perfdata_1a0.dat
    + 2006-09-12 22:43:06 96,256 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_c9ba3671\ATL80.dll
    + 2006-09-12 22:41:36 479,232 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_691a48fd\msvcm80.dll
    + 2006-09-12 22:41:36 548,864 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_691a48fd\msvcp80.dll
    + 2006-09-12 22:41:36 626,688 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_691a48fd\msvcr80.dll
    + 2006-09-13 00:12:34 1,101,824 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_3a00bc02\mfc80.dll
    + 2006-09-13 00:12:40 1,092,608 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_3a00bc02\mfc80u.dll
    + 2006-09-13 00:12:44 69,632 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_3a00bc02\mfcm80.dll
    + 2006-09-13 00:12:46 57,856 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_3a00bc02\mfcm80u.dll
    + 2006-09-12 23:54:30 40,960 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80CHS.dll
    + 2006-09-12 23:54:30 45,056 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80CHT.dll
    + 2006-09-12 23:54:28 65,536 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80DEU.dll
    + 2006-09-12 23:54:30 57,344 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80ENU.dll
    + 2006-09-12 23:54:30 61,440 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80ESP.dll
    + 2006-09-12 23:54:28 61,440 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80FRA.dll
    + 2006-09-12 23:54:30 61,440 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80ITA.dll
    + 2006-09-12 23:54:30 49,152 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80JPN.dll
    + 2006-09-12 23:54:30 49,152 ----a-w D:\WINDOWS\WinSxS\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.363_x-ww_8f4fd500\mfc80KOR.dll
    .
    -- Snapshot reset to current date --
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MsnMsgr"="D:\Program Files\MSN Messenger\MsnMsgr.Exe" [2007-01-19 5674352]
    "googletalk"="D:\Program Files\Google\Google Talk\googletalk.exe" [2007-01-01 3739648]
    "Skype"="D:\Program Files\MSN Messenger\Phone\Skype.exe" [2007-09-13 22880040]
    "SpybotSD TeaTimer"="D:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-08-18 1832272]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SynTPEnh"="D:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2004-01-09 491520]
    "ZoneAlarm Client"="D:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe" [2008-07-09 919016]
    "Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-02-29 D:\WINDOWS\KHALMNPR.Exe]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="D:\WINDOWS\System32\ctfmon.exe" [2004-08-04 15360]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
    "NoResolveSearch"= 1 (0x1)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
    2008-05-02 02:42 72208 d:\Program Files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.enc"= ITIG726.acm
    "msacm.divxa32"= DivXa32.acm
    "VIDC.ACDV"= ACDV.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
    @=""

    [HKLM\~\startupfolder\D:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech SetPoint.lnk]
    backup=D:\WINDOWS\pss\Logitech SetPoint.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CplBCL50]
    --a------ 2004-03-02 11:45 401408 D:\Program Files\EzButton\CplBCL50.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
    -ra------ 2001-07-09 11:50 155648 D:\WINDOWS\system32\NeroCheck.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\StartCCC]
    --a------ 2008-01-21 12:17 61440 D:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    --a------ 2008-06-10 04:27 144784 D:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPLpr]
    --a------ 2004-01-09 08:09 98304 D:\Program Files\Synaptics\SynTP\SynTPLpr.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Kernel and Hardware Abstraction Layer]
    --a------ 2008-02-29 03:12 76304 D:\WINDOWS\KHALMNPR.Exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Logitech Utility]
    --------- 2003-12-11 09:50 20992 D:\WINDOWS\LOGI_MWX.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMan]
    --a------ 2007-04-16 15:28 577536 D:\WINDOWS\soundman.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "Ati HotKey Poller"=2 (0x2)
    "usnjsvc"=3 (0x3)
    "PnkBstrB"=3 (0x3)
    "Pml Driver HPZ12"=3 (0x3)
    "Norman ZANDA"=2 (0x2)
    "IDriverT"=3 (0x3)
    "ose"=3 (0x3)
    "Adobe LM Service"=3 (0x3)
    "LBTServ"=3 (0x3)
    "WudfSvc"=2 (0x2)
    "ATI Smart"=2 (0x2)
    "xmlprov"=3 (0x3)
    "WZCSVC"=2 (0x2)
    "Spooler"=2 (0x2)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
    "LVCOMSX"=D:\WINDOWS\System32\LVCOMSX.EXE
    "HP Component Manager"="D:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
    "HP Software Update"=D:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    "Windows Automatical Updater"=dcz.exe
    "QuickTime Task"="D:\Program Files\QuickTime\qttask.exe" -atboottime
    "SunJavaUpdateSched"=D:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    "ATIModeChange"=Ati2mdxx.exe
    "LogitechVideoTray"=D:\Program Files\Logitech\Video\LogiTray.exe
    "Logitech Hardware Abstraction Layer"=KHALMNPR.EXE
    "AGRSMMSG"=AGRSMMSG.exe
    "LtMoh"=D:\Program Files\ltmoh\Ltmoh.exe
    "NeroFilterCheck"=D:\WINDOWS\system32\NeroCheck.exe
    "KernelFaultCheck"=%systemroot%\system32\dumprep 0 -k
    "<NO NAME>"=
    "LogitechVideoRepair"=D:\Program Files\Logitech\Video\ISStart.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "D:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
    "D:\\Program Files\\uTorrent\\utorrent.exe"=
    "D:\\Program Files\\Sony Ericsson\\Update Service\\Update Service.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "D:\\WINDOWS\\system32\\dplaysvr.exe"=
    "D:\\Program Files\\Activision Value\\WSOP 2008\\WSOPBFTB.exe"=
    "D:\\WINDOWS\\system32\\sessmgr.exe"=
    "C:\\Programs\\VLC\\vlc.exe"=
    "D:\\Program Files\\MSN Messenger\\livecall.exe"=
    "D:\\Program Files\\MSN Messenger\\Phone\\Skype.exe"=

    R1 aswSP;avast! Self Protection;D:\WINDOWS\system32\drivers\aswSP.sys [2008-07-19 78416]
    R2 aswFsBlk;aswFsBlk;D:\WINDOWS\system32\DRIVERS\aswFsBlk.sys [2008-07-19 20560]
    R3 WBSD;Winbond Secure Digital Storage (SD/MMC) Device Driver;D:\WINDOWS\system32\Drivers\WBSD.SYS [2003-03-20 25856]
    .
    Contents of the 'Scheduled Tasks' folder

    2008-10-12 D:\WINDOWS\Tasks\GlaryInitialize.job
    - D:\Program Files\Glary Utilities\initialize.exe [2008-09-17 16:35]

    2006-11-05 D:\WINDOWS\Tasks\jeg står opp.job
    - C:\Music\My Playlists\jeg st []

    2008-10-12 D:\WINDOWS\Tasks\Spybot - Search & Destroy - Scheduled Task.job
    - D:\Program Files\Spybot - Search & Destroy\SpybotSD.exe [2008-07-30 14:45]

    2008-10-12 D:\WINDOWS\Tasks\Spybot - Search & Destroy Updater - Scheduled Task.job
    - D:\Program Files\Spybot - Search & Destroy\SDUpdate.exe [2008-08-14 13:39]
    .

    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-12 17:06:46
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    D:\WINDOWS\system32\ZoneLabs\vsmon.exe
    D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    D:\Program Files\Alwil Software\Avast4\ashServ.exe
    D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    D:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    .
    **************************************************************************
    .
    Completion time: 2008-10-12 17:15:53 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-10-12 15:15:44
    ComboFix2.txt 2008-10-01 09:34:51
    ComboFix3.txt 2008-10-01 09:23:19

    Pre-Run: 3 337 388 032 bytes free
    Post-Run: 3,476,152,320 bytes free

    313 --- E O F --- 2008-09-25 10:35:21


    Had to break in two post due to character restriction.
     
  8. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    Malwarebytes' Anti-Malware 1.28
    Database version: 1261
    Windows 5.1.2600 Service Pack 2

    12.10.2008 20:52:31
    mbam-log-2008-10-12 (20-52-31).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 133655
    Time elapsed: 59 minute(s), 22 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)




    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 20:53:54, on 12.10.2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16674)
    Boot mode: Normal

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\ZoneLabs\vsmon.exe
    D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    D:\Program Files\Alwil Software\Avast4\ashServ.exe
    D:\WINDOWS\Explorer.EXE
    D:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    D:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    D:\Program Files\EzButton\CplBCL50.EXE
    D:\WINDOWS\System32\svchost.exe
    D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    D:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\System32\LVComsX.exe
    D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.unimelb.edu.au/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - HKLM\..\Run: [SynTPEnh] D:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [ZoneAlarm Client] "D:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [CplBCL50] D:\Program Files\EzButton\CplBCL50.EXE
    O4 - HKCU\..\Run: [MsnMsgr] "D:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [googletalk] "D:\Program Files\Google\Google Talk\googletalk.exe" /autostart
    O4 - HKCU\..\Run: [Skype] "D:\Program Files\MSN Messenger\Phone\Skype.exe" /nosplash /minimized
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] D:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\ctfmon.exe (User 'Default user')
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe
    O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\poker\Party\PartyPoker\RunApp.exe
    O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\poker\Party\PartyPoker\RunApp.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - D:\Program Files\PartyPoker.net\partypokernet.exe (file missing)
    O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - D:\Program Files\PartyPoker.net\partypokernet.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O16 - DPF: ImageUploader - http://www.direktefoto.no/df/Aurigma/ImageUploader.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1126801348456
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1142168542307
    O16 - DPF: {D8575CE3-3432-4540-88A9-85A1325D3375} (e-Safekey) - https://netbank.danskebank.dk/html/activex/e-Safekey/DB/e-Safekey.cab
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CS3\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: SearchList = vic.bigpond.net.au
    O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - D:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - D:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - D:\WINDOWS\system32\ZoneLabs\vsmon.exe

    --
    End of file - 6222 bytes



    I hope you can help me further with this problem!!!

    Chris
     
  9. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    How's the computer rrunning now any better?


    Did you run the super scan, have you the log?


    Fix this one with hijack this!


    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
     
  10. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    One of the original problems still exist. I deleted MSN Live from my computer, but when I accessed D:\Documents and Settings\Chissamann\ the intruding pop-up messages till comes. Another message came up this time, not one (fakingly) asking for username and password, but instead ‘Windows Live ID Internet Connection Error. Your request cannot be completed…’. So that program/virus is still active trying to steal my MSN Live details.

    As this happened my firewall (Zonealarm) asked if I wanted to grant explorer.exe to connect to the internet. Does that mean that explorer.exe is the source of the virus?

    When I searched for explorer.exe on my computer, amongst others these came up:

    A CureIt log:
    D:\WINDOWS\ServicePackFiles\i386\explorer.exe - Ok
    D:\WINDOWS\system32\dllcache\explorer.exe – Ok

    From Dr.Watson log:
    Application exception occurred:
    App: D:\WINDOWS\Explorer.EXE (pid=460)
    When: 1/28/2008 @ 20:56:44.075
    Exception number: c0000005 (access violation)

    *** ERROR: Symbol file could not be found. Defaulted to export symbols for D:\WINDOWS\system32\SHELL32.dll -
    WARNING: Stack unwind information not available. Following frames may be wrong.
    *** ERROR: Module load completed but symbols could not be loaded for D:\WINDOWS\Explorer.EXE

    Description from adaware:
    [Win32.Trojan.Inject]
    content=Win32.Trojan.Inject is a malware which injects itself into legitimate processes. It may run behind processes as svchost.exe, iexplorer.exe and rundll32.exe. While running protected by another process it may contact remote domains to download malwares. It's purpose is to hide itself from the visible processes and infect the user's system.

    From AdAware log:
    #:12 [explorer.exe]
    FilePath : D:\WINDOWS\
    ProcessID : 1684
    ThreadCreationTime : 10.05.2006 12:58:35
    BasePriority : Normal
    FileVersion : 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
    ProductVersion : 6.00.2900.2180
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Windows Explorer
    InternalName : explorer
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : EXPLORER.EXE
    Here I noticed that name is not the same as original filename (different caps). Does that confirm explorer.exe being a virus?

    2 logs came up from Teleca, which is located in D:\Documents and Settings\Chissamann\ where the source of the virus may be. Does that mean that the virus is hiding as Teleca, or is Teleca a known problem?
    070430 22:52:22 [CA16.AppLauncher.INFO] [AppLauncher] [3688] [3352] [CCommandHandler::ExecuteCommand CommandHandler.cpp:346] Launching command: D:\WINDOWS\\explorer.exe /n,::{A5110426-177D-4E08-AB3F-785F10B4439C}






    Here is the SuperAntiSpyware log:

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 10/13/2008 at 10:22 PM

    Application Version : 4.21.1004

    Core Rules Database Version : 3595
    Trace Rules Database Version: 1582

    Scan type : Complete Scan
    Total Scan Time : 01:52:13

    Memory items scanned : 302
    Memory threats detected : 0
    Registry items scanned : 5553
    Registry threats detected : 1
    File items scanned : 93691
    File threats detected : 58

    Adware.Tracking Cookie
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][4].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][5].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][3].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][7].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][3].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][1].txt
    D:\Documents and Settings\Chissamann\Cookies\[email protected][2].txt

    Adware.NetPumper
    HKU\S-1-5-21-448539723-1708537768-854245398-1003\Software\NetPumper

    Adware.Casino Games (Golden Palace Casino)
    C:\POKER\TITAN POKER\CASINO.EXE
    D:\WINDOWS\Prefetch\CASINO.EXE-0EF56507.pf

    Adware.GloboLook
    C:\PROGRAMS\1000+ ICONS\MISC\VISA.ICO
    C:\PROGRAMS\1000+ ICONS\MUSIC\LES PAUL.ICO
    C:\PROGRAMS\1000+ ICONS\SCIENCE & MEDICINE\HOSPITAL.ICO
    C:\PROGRAMS\1000+ ICONS\SEASONS & HOLIDAYS\AUGUST.ICO
    C:\PROGRAMS\1000+ ICONS\SPORTS & RECREATION\BASKETBALL.ICO
    C:\PROGRAMS\1000+ ICONS\SPORTS & RECREATION\BLACKJACK.ICO
    C:\PROGRAMS\1000+ ICONS\SPORTS & RECREATION\KING.ICO
    C:\PROGRAMS\1000+ ICONS\TRANSPORTATION\58 CORVETTE.ICO
    C:\PROGRAMS\1000+ ICONS\TRANSPORTATION\747.ICO

    I did not remove the casino.exe, as I need it to play poker, is that ok?

    Thanks for your quick replies
     
  11. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    clean log.

    explorer.exe is a legitimate file and it doesn't need to be connected to the internet, only ieplorer.exe does and other browsers.

    Adware is no doubt issuing a false positive!



    You should now turn off system restore to flush out the bad restore points
    and
    then re-enable it and make a new clean restore point.


    How to turn off system restore

    http://service1.symantec.com/SUPPOR...2001111912274039?OpenDocument&src=sec_doc_nam


    http://support.microsoft.com/default.aspx?scid=kb;[LN];310405




    Here's some free tools to keep you from getting infected in the future.


    To stop reinfection get spywareblaster from


    http://www.javacoolsoftware.com/downloads.html


    get the hosts file from here.Unzip it to a folder!



    http://www.mvps.org/winhelp2002/hosts.htm


    put it into : or click the mvps bat and it should do it for you!


    Windows XP = C:\WINDOWS\SYSTEM32\DRIVERS\ETC
    Windows 2K = C:\WINNT\SYSTEM32\DRIVERS\ETC
    Win 98\ME = C:\WINDOWS



    ie-spyad.Puts over 5000 sites in your restricted zone so you'll be protected

    when you visit innocent-looking sites that aren't actually innocent at all.


    http://www.spywarewarrior.com/uiuc/resource.htm




    Use either Arovax or spyware terminator, you could try both and see
    what one you like!


    Arovax shield.

    http://www.arovaxshield.com/


    Spyware Terminator

    http://www.spywareterminator.com/dnl/landing.aspx


    In spyware terminator, click real time protection and tick the box to use
    real time protection and tick all the boxes except file exceptions shield.
    If your confident in using its advanced feature, click advanced and tick
    the HIPS box.

    If you want to install and uninstall programs it is best to
    temporarily disable Spyware terminator and then re-enable it after you
    have installed or uninstalled a program as it will create a lot of pop ups
    asking you do you wish this to happen!

    Right click spyware terminator on the bottom right of your status bar and
    choose exit.Then tick the box and that is spyware terminator disabled!




    I would also suggest switching to Mozilla's firefox browser, it's safer, has
    a built in pop up blocker, blocks cookies and adds. Mozilla Thunderbird is
    also a good
    e-mail client.

    http://www.mozilla.org/


    Another good and free browser is Opera!

    http://www.opera.com/


    Read here to see how to tighten your security:

    http://forums.techguy.org/t208517.html


    A good overall guide for firewalls, anti-virus, and anti-trojans as well as
    regular spyware cleaners.

    http://www.firewallguide.com/anti-trojan.htm



    you can mark your own thread solved through thread tools at the top of
    the page.
     
  12. Chris83

    Chris83 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    7
    I think you have misunderstood me, the case/thread is not yet solved. Yes the computer is not slow anymore, thank you very much for that, but the initial reason I contacted this forum is still here (althoug it has changed because I installed firewall, after your recommondations).

    Initially whenever I explored my computer at D:\Documents and Settings\Chissamann, a pop up would come and ask for my usernam and password, clearly not being from MSN/LIVE, see picture attached to first message. I DO NOT EVEN HAVE MSN OR LIVE INSTALLED!!! But after the installation of firewall (ZoneAlarm), whenever i access D:\Documents and Settings\Chissamann, ZoneAlarm asks me if explorer should be granted an internet access. And the pop up is now ''WINDOWS LIVE ID Internet Connection Error. Your request cannot be completed...''.

    Does this mean that explorer.exe is the virus?

    So I guess now, the virus cannot access internett, but it is still present. What can I do?

    Thank you for all your time.
     
  13. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    explorer.exe is not a virus it is part of windows! I think what is happening is windows live or msn messenger is still trying to automatically connect to the internet.

    use zone alarm to block msn, windows explorer!


    Click Start > Run > and type in:

    services.msc

    Click OK.

    In the services window find msn messenger or messenger
    Right click and choose "Properties". On the "General" tab under "Service
    Status" click the "Stop" button to stop the service. Beside "Startup Type"
    in the dropdown menu select "Disabled". Click Apply then OK. Exit the
    Services utility.

    Note: You may get an error here when trying to access the properties of the
    service. If you do get an error, just select the service and look there in
    the top left of the main service window and click "Stop" to stop the
    service. If that gives an error or it is already stopped, just skip this
    step and proceed with the rest.



    You still have msn messenger running here in your log and also through skype! So have you actually uninstalled it, all you need to do is disable it and use ZA to block them from internet access including EXPLORER.EXE as it does not need internet access!


    O4 - HKCU\..\Run: [MsnMsgr] "D:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [Skype] "D:\Program Files\MSN Messenger\Phone\Skype.exe" /nosplash /minimized



    fix these with hijack this!


    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe (file missing)
     
  14. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/754824

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice