Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

SpySheriff & BraveSentry


  • Please log in to reply

#1
Pjeanmart

Pjeanmart

    Member

  • Member
  • PipPip
  • 14 posts
< system: Windows XP Professional 2002, SP2 >

Hi,

A couple of weeks ago, my computer got infected by Spysheriff and BraveSentry. Internet Explorer Homepage was changed and the background of the Desktop got white. A new restore point was automatically created and all the previous ones were deleted (so long for my brilliant idea of restoring…).

I have carefully read many post on this site and followed the steps that were helpful to others to clean their machine. I don’t seem to have the above mentioned intruders anymore, but my computer is still awfully slow (for exemple, a Spybot scan used to take 20 min, it now takes up to 2 hours). Also, whenever I run the tools you guys recommend (AdAware, Panda, Spybot, etc.), I keep finding and removing bugs, which come back at reboot. By the way, 3 out of 4 times I run these tools, I get an error message, saying that it needs to close (sometimes the debug button works, sometimes it doesn’t), which I think is not a good sign. My Internet Explorer Homepage keeps changing to MSN.com and in general, my computer is not “acting normal”.

So my guess is, I still have some “residue” of the Malware/Spyware/Adware that won’t leave so easily.

Sorry in advance for the length of this post, but I try to give you the more details I can. So here is what I have done up to now:

I have followed the steps indicated in the “How to remove SpySheriff” that I found in the “Before you post a Hijack log” post;

(Safe Mode) SmitRem <Report below>
(Safe Mode) AdAware
(Safe Mode) Ewido – which is now AVG Anti-Spyware <Report below>
Panda Active Scan <Report below>

I then followed all other steps explained in the “Before you post a Hijack log” post;

CleanUp
AdAware <Report below>
(Safe Mode) CWShedder - Nothing Found
Spybot <Printscreen of results attached in Word document> Attached File  Spybot_2006.10.14.doc   79.5KB   13 downloads
AVG Virus Scan – Nothing Found
Trend Micro Online Virus Scan – Nothing Found
And finally, a HijackThis log.

If someone could take a look at all this, it would be very appreciated.

Reports

*****SmitRem*****

smitRem © log file
version 3.2

by noahdfear


Microsoft Windows XP [Version 5.1.2600]
"IE"="6.0000"
The current date is: 06-10-14
The current time is: 12:42:44.40

Running from
C:\Documents and Settings\PatMan\Desktop\smitRem

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pre-run SharedTask Export


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Appinitdll check ........ Thank you Grinler!

dumphive.exe ©2000-2004 Markus Stephany
REGEDIT4

[Windows]
"AppInit_DLLs"="\\\\?\\C:\\WINDOWS\\system32\\lpt9.mjx"
"DeviceNotSelectedTimeout"="15"
"GDIProcessHandleQuota"=dword:00002710
"Spooler"="yes"
"swapdisk"=""
"TransmissionRetryTimeout"="90"
"USERProcessHandleQuota"=dword:00002710

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

XP Firewall allowed access

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Kazaa Lite K++\\KazaaLite.kpp"="C:\\Program Files\\Kazaa Lite K++\\KazaaLite.kpp:*:Disabled:KazaaLite"
"C:\\Program Files\\iTunes\\iTunes.exe"="C:\\Program Files\\iTunes\\iTunes.exe:*:Enabled:iTunes"
"C:\\Program Files\\ubi.com\\Core\\GS4.exe"="C:\\Program Files\\ubi.com\\Core\\GS4.exe:*:Disabled:ubi.com Game Service"
"C:\\WINDOWS\\System32\\TCPUDPwarA.exe"="C:\\WINDOWS\\System32\\TCPUDPwarA.exe:*:Enabled:TCPUDPwarA"
"C:\\Program Files\\Valve\\Steam\\Steam.exe"="C:\\Program Files\\Valve\\Steam\\Steam.exe:*:Enabled:Steam"
"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE"="C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE:*:Enabled:Internet Explorer"
"C:\\Program Files\\Grisoft\\AVG Free\\avginet.exe"="C:\\Program Files\\Grisoft\\AVG Free\\avginet.exe:*:Enabled:avginet.exe"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:MSN Messenger 7.5"
"C:\\Program Files\\WolfensteinET\\ET.exe"="C:\\Program Files\\WolfensteinET\\ET.exe:*:Enabled:ET"
"C:\\Program Files\\Turbine\\Dungeons & Dragons Online - Stormreach\\dndclient.exe"="C:\\Program Files\\Turbine\\Dungeons & Dragons Online - Stormreach\\dndclient.exe:*:Enabled:dndclient"

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


checking for ShudderLTD key

ShudderLTD key not present!

checking for PSGuard.com key


PSGuard.com key not present!


checking for WinHound.com key


WinHound.com key not present!


checking for drsmartload2 key


drsmartload2 key not present!

spyaxe uninstaller NOT present
Winhound uninstaller NOT present
SpywareStrike uninstaller NOT present
AlfaCleaner uninstaller NOT present
SpyFalcon uninstaller NOT present
SpywareQuake uninstaller NOT present
SpywareSheriff uninstaller NOT present
Trust Cleaner uninstaller NOT present
SpyHeal uninstaller NOT present
VirusBurst uninstaller NOT present
BraveSentry uninstaller NOT present

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Existing Pre-run Files


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~


~~~ Miscellaneous Files/folders ~~~




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 892 'explorer.exe'
Killing PID 892 'explorer.exe'

Starting registry repairs

Registry repairs complete

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SharedTask Export after registry fix


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Deleting files

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Remaining Post-run Files


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~


~~~ Miscellaneous Files/folders ~~~



~~~ Wininet.dll ~~~

CLEAN! :whistling:



*****EWIDO - AVG ANTI-SPYWARE*****

---------------------------------------------------------
AVG Anti-Spyware - Scan Report
---------------------------------------------------------

+ Created at: 14:15 06-10-14

+ Scan result:



HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\ins -> Adware.WebRebates : Ignored.
[2036] VM_008C0000 -> Downloader.Agent.uj : Cleaned with backup (quarantined).
[244] VM_00D60000 -> Downloader.Agent.uj : Cleaned with backup (quarantined).
[268] VM_00D70000 -> Downloader.Agent.uj : Cleaned with backup (quarantined).


::Report end




*****PANDA ACTIVE SCAN*****

Incident Status Location

Potentially unwanted tool:Application/Processor Not disinfected C:\WINDOWS\system32\Process.exe
Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\PatMan\Desktop\smitRem\Process.exe

*****AD AWARE*****

Ad-Aware SE Build 1.06r1
Logfile Created on:06-10-14 18:28:09
Created with Ad-Aware SE Personal, free for private use.
Using definitions file:SE1R126 12.10.2006
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

References detected during the scan:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Adware.LinkOptimizer(TAC index:4):3 total references
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Ad-Aware SE Settings
===========================
Set : Search for low-risk threats
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep-scan registry
Set : Scan my IE Favorites for banned URLs
Set : Scan my Hosts file

Extended Ad-Aware SE Settings
===========================
Set : Unload recognized processes & modules during scan
Set : Scan registry for all users instead of current user only
Set : During removal, unload Explorer and IE if necessary
Set : Let Windows remove files in use at next reboot
Set : Delete quarantined objects after restoring
Set : Include basic Ad-Aware settings in log file
Set : Include additional Ad-Aware settings in log file
Set : Include reference summary in log file
Set : Include alternate data stream details in log file
Set : Play sound at scan completion if scan locates critical objects


06-10-14 18:28:09 - Scan started. (Full System Scan)

Listing running processes
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

#:1 [smss.exe]
FilePath : \SystemRoot\System32\
ProcessID : 524
ThreadCreationTime : 06-10-14 18:18:12
BasePriority : Normal


#:2 [csrss.exe]
FilePath : \??\C:\WINDOWS\system32\
ProcessID : 580
ThreadCreationTime : 06-10-14 18:18:14
BasePriority : Normal


#:3 [winlogon.exe]
FilePath : \??\C:\WINDOWS\system32\
ProcessID : 608
ThreadCreationTime : 06-10-14 18:18:16
BasePriority : High


#:4 [services.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 656
ThreadCreationTime : 06-10-14 18:18:18
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Services and Controller app
InternalName : services.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : services.exe

#:5 [lsass.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 668
ThreadCreationTime : 06-10-14 18:18:18
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : LSA Shell (Export Version)
InternalName : lsass.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : lsass.exe

#:6 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 868
ThreadCreationTime : 06-10-14 18:18:20
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:7 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 936
ThreadCreationTime : 06-10-14 18:18:22
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:8 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1032
ThreadCreationTime : 06-10-14 18:18:23
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:9 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1144
ThreadCreationTime : 06-10-14 18:18:24
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:10 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1220
ThreadCreationTime : 06-10-14 18:18:25
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:11 [spoolsv.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1384
ThreadCreationTime : 06-10-14 18:18:28
BasePriority : Normal
FileVersion : 5.1.2600.2696 (xpsp_sp2_gdr.050610-1519)
ProductVersion : 5.1.2600.2696
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Spooler SubSystem App
InternalName : spoolsv.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : spoolsv.exe

#:12 [guard.exe]
FilePath : C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\
ProcessID : 1564
ThreadCreationTime : 06-10-14 18:18:35
BasePriority : Normal
FileVersion : 7, 5, 0, 47
ProductVersion : 7, 5, 0, 47
ProductName : AVG Anti-Spyware
CompanyName : Anti-Malware Development a.s.
FileDescription : AVG Anti-Spyware guard
InternalName : AVG Anti-Spyware guard
LegalCopyright : Copyright © 2006 Anti-Malware Development a.s.
OriginalFilename : guard.exe

#:13 [avgamsvr.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1580
ThreadCreationTime : 06-10-14 18:18:35
BasePriority : Normal
FileVersion : 7,1,0,365
ProductVersion : 7.1.0.365
ProductName : AVG Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Alert Manager
InternalName : avgamsvr
LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
OriginalFilename : avgamsvr.EXE

#:14 [avgupsvc.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1620
ThreadCreationTime : 06-10-14 18:18:36
BasePriority : Normal
FileVersion : 7,1,0,349
ProductVersion : 7.1.0.349
ProductName : AVG 7.0 Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Update Service
InternalName : avgupsvc
LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
OriginalFilename : avgupdsvc.EXE

#:15 [ctsvccda.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1652
ThreadCreationTime : 06-10-14 18:18:36
BasePriority : Normal
FileVersion : 1.0.1.0
ProductVersion : 1.0.0.0
ProductName : Creative Service for CDROM Access
CompanyName : Creative Technology Ltd
FileDescription : Creative Service for CDROM Access
InternalName : CTsvcCDAEXE
LegalCopyright : Copyright © Creative Technology Ltd., 1999. All rights reserved.
OriginalFilename : CTsvcCDA.EXE

#:16 [mdm.exe]
FilePath : C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\
ProcessID : 1692
ThreadCreationTime : 06-10-14 18:18:37
BasePriority : Normal
FileVersion : 7.00.9466
ProductVersion : 7.00.9466
ProductName : Microsoft® Visual Studio .NET
CompanyName : Microsoft Corporation
FileDescription : Machine Debug Manager
InternalName : mdm.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : mdm.exe

#:17 [nvsvc32.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1728
ThreadCreationTime : 06-10-14 18:18:38
BasePriority : Normal
FileVersion : 6.14.10.5216
ProductVersion : 6.14.10.5216
ProductName : NVIDIA Driver Helper Service, Version 52.16
CompanyName : NVIDIA Corporation
FileDescription : NVIDIA Driver Helper Service, Version 52.16
InternalName : NVSVC
LegalCopyright : © NVIDIA Corporation. All rights reserved.
OriginalFilename : nvsvc32.exe

#:18 [wdfmgr.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1988
ThreadCreationTime : 06-10-14 18:18:40
BasePriority : Normal
FileVersion : 5.2.3790.1230 built by: DNSRV(bld4act)
ProductVersion : 5.2.3790.1230
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Windows User Mode Driver Manager
InternalName : WdfMgr
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : WdfMgr.exe

#:19 [mspmspsv.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 256
ThreadCreationTime : 06-10-14 18:18:41
BasePriority : Normal
FileVersion : 7.01.00.3055
ProductVersion : 7.01.00.3055
ProductName : Microsoft ® DRM
CompanyName : Microsoft Corporation
FileDescription : WMDM PMSP Service
InternalName : MSPMSPSV.EXE
LegalCopyright : Copyright © Microsoft Corp. 1981-2000
OriginalFilename : MSPMSPSV.EXE

#:20 [alg.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 2136
ThreadCreationTime : 06-10-14 18:18:58
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Application Layer Gateway Service
InternalName : ALG.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : ALG.exe

#:21 [wuauclt.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 3992
ThreadCreationTime : 06-10-14 22:26:08
BasePriority : Normal
FileVersion : 5.8.0.2469 built by: lab01_n(wmbla)
ProductVersion : 5.8.0.2469
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Automatic Updates
InternalName : wuauclt.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : wuauclt.exe

#:22 [wmiprvse.exe]
FilePath : C:\WINDOWS\System32\wbem\
ProcessID : 3120
ThreadCreationTime : 06-10-14 22:26:30
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : WMI
InternalName : Wmiprvse.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : Wmiprvse.exe

#:23 [wgatray.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 2960
ThreadCreationTime : 06-10-14 22:26:35
BasePriority : Normal
FileVersion : 1.5.0540.0
ProductVersion : 1.5.0540.0
ProductName : Windows Genuine Advantage
CompanyName : Microsoft Corporation
FileDescription : Windows Genuine Advantage Notification
InternalName : WgaNotify
LegalCopyright : © 1995-2006 Microsoft Corporation
OriginalFilename : WgaTray.exe

#:24 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 3428
ThreadCreationTime : 06-10-14 22:26:36
BasePriority : Normal
FileVersion : 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 6.00.2900.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : EXPLORER.EXE

#:25 [itouch.exe]
FilePath : C:\Program Files\Logitech\iTouch\
ProcessID : 452
ThreadCreationTime : 06-10-14 22:26:49
BasePriority : Normal
FileVersion : 2.10.159
ProductVersion : 2.10
ProductName : iTouch
CompanyName : Logitech Inc.
FileDescription : iTouch Application
InternalName : iTouch
LegalCopyright : © 1998-2002 Logitech. All rights reserved.
LegalTrademarks : Logitech® and iTouch® are registered trademarks of Logitech Inc.
OriginalFilename : iTouch.exe
Comments :

#:26 [em_exec.exe]
FilePath : C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\
ProcessID : 1288
ThreadCreationTime : 06-10-14 22:26:50
BasePriority : Normal
FileVersion : 9.71.218
ProductVersion : 9.71
ProductName : MouseWare
CompanyName : Logitech Inc.
FileDescription : Control Center
InternalName : EM_EXEC
LegalCopyright : Copyright © Logitech Inc. 1987-2002.
LegalTrademarks : Logitech® and MouseWare® are registered trademarks of Logitech Inc.
OriginalFilename : EM_EXEC.CPP
Comments : Created by the MouseWare Team

#:27 [ituneshelper.exe]
FilePath : C:\Program Files\iTunes\
ProcessID : 1500
ThreadCreationTime : 06-10-14 22:26:52
BasePriority : Normal
FileVersion : 4.7.0.42
ProductVersion : 4.7.0.42
ProductName : iTunes
CompanyName : Apple Computer, Inc.
FileDescription : iTunesHelper Module
InternalName : iTunesHelper
LegalCopyright : © 2003-2004 Apple Computer, Inc. All Rights Reserved.
OriginalFilename : iTunesHelper.exe

#:28 [wuauclt.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1504
ThreadCreationTime : 06-10-14 22:26:54
BasePriority : Normal
FileVersion : 5.8.0.2469 built by: lab01_n(wmbla)
ProductVersion : 5.8.0.2469
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Automatic Updates
InternalName : wuauclt.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : wuauclt.exe

#:29 [qttask.exe]
FilePath : C:\Program Files\QuickTime\
ProcessID : 1776
ThreadCreationTime : 06-10-14 22:26:54
BasePriority : Normal
FileVersion : 6.5.1
ProductVersion : QuickTime 6.5.1
ProductName : QuickTime
CompanyName : Apple Computer, Inc.
InternalName : QuickTime Task
LegalCopyright : © Apple Computer, Inc. 2001-2004
OriginalFilename : QTTask.exe

#:30 [avgcc.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 3996
ThreadCreationTime : 06-10-14 22:26:55
BasePriority : Normal
FileVersion : 7,1,0,406
ProductVersion : 7.1.0.406
ProductName : AVG Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Control Center
InternalName : AvgCC
LegalCopyright : Copyright © 2006, GRISOFT, s.r.o.
OriginalFilename : AvgCC.EXE

#:31 [avgas.exe]
FilePath : C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\
ProcessID : 2140
ThreadCreationTime : 06-10-14 22:26:55
BasePriority : Normal
FileVersion : 7, 5, 0, 50
ProductVersion : 7, 5, 0, 50
ProductName : AVG Anti-Spyware
CompanyName : Anti-Malware Development a.s.
FileDescription : AVG Anti-Spyware
InternalName : AVG Anti-Spyware
LegalCopyright : Copyright © 2006 Anti-Malware Development a.s.
OriginalFilename : avgas.exe

#:32 [thguard.exe]
FilePath : C:\Program Files\TrojanHunter 4.6\
ProcessID : 660
ThreadCreationTime : 06-10-14 22:26:55
BasePriority : Normal
FileVersion : 4.5.0.277
ProductVersion : 1.0.0.0
ProductName : TrojanHunter Guard
CompanyName : Mischel Internet Security
FileDescription : TrojanHunter Guard
LegalCopyright : Mischel Internet Security
LegalTrademarks : TrojanHunter is a trademark of Mischel Internet Security.
OriginalFilename : THGuard.exe

#:33 [googletoolbarnotifier.exe]
FilePath : C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\
ProcessID : 1996
ThreadCreationTime : 06-10-14 22:26:55
BasePriority : Normal
FileVersion : 1, 0, 720, 3640
ProductVersion : 1, 0, 720, 3640
ProductName : GoogleToolbarNotifier
CompanyName : Google Inc.
FileDescription : GoogleToolbarNotifier
LegalCopyright : Copyright © 2005-2006
OriginalFilename : GoogleToolbarNotifier.exe

#:34 [acrotray.exe]
FilePath : C:\Program Files\Adobe\Acrobat 6.0\Distillr\
ProcessID : 2296
ThreadCreationTime : 06-10-14 22:26:57
BasePriority : Normal
FileVersion : 6.0.0.2003051500
ProductVersion : 6.0.0.0
ProductName : AcroTray - Adobe Acrobat Distiller helper application.
CompanyName : Adobe Systems Inc.
FileDescription : AcroTray
InternalName : AcroTray
LegalCopyright : Copyright 1984-2003 Adobe Systems Incorporated and its licensors. All rights reserved.
OriginalFilename : AcroTray.exe

#:35 [ipodservice.exe]
FilePath : C:\Program Files\iPod\bin\
ProcessID : 2304
ThreadCreationTime : 06-10-14 22:26:57
BasePriority : Normal
FileVersion : 4.7.0.42
ProductVersion : 4.7.0.42
ProductName : iTunes
CompanyName : Apple Computer, Inc.
FileDescription : iPodService Module
InternalName : iPodService
LegalCopyright : © 2003-2004 Apple Computer, Inc. All Rights Reserved.
OriginalFilename : iPodService.exe

#:36 [ad-aware.exe]
FilePath : C:\Ad-Aware SE Personal\
ProcessID : 2720
ThreadCreationTime : 06-10-14 22:27:11
BasePriority : Normal
FileVersion : 6.2.0.236
ProductVersion : SE 106
ProductName : Lavasoft Ad-Aware SE
CompanyName : Lavasoft Sweden
FileDescription : Ad-Aware SE Core application
InternalName : Ad-Aware.exe
LegalCopyright : Copyright © Lavasoft AB Sweden
OriginalFilename : Ad-Aware.exe
Comments : All Rights Reserved

Memory scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0


Started registry scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Adware.LinkOptimizer Object Recognized!
Type : Regkey
Data :
TAC Rating : 4
Category : Malware
Comment :
Rootkey : HKEY_CLASSES_ROOT
Object : clsid\{e3a77057-d10b-b02a-d823-22e020c583b5}

Registry Scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 1
Objects found so far: 1


Started deep registry scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Deep registry scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 1


Started Tracking Cookie scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


Tracking cookie scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 1



Deep scanning and examining files (C:)
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Disk Scan Result for C:\
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 1


Scanning Hosts file......
Hosts file location:"C:\WINDOWS\system32\drivers\etc\hosts".
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Hosts file scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
1 entries scanned.
New critical objects:0
Objects found so far: 1




Performing conditional scans...
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Adware.LinkOptimizer Object Recognized!
Type : Regkey
Data :
TAC Rating : 4
Category : Malware
Comment :
Rootkey : HKEY_LOCAL_MACHINE
Object : software\microsoft\internet explorer\urlsearchhooks

Adware.LinkOptimizer Object Recognized!
Type : RegValue
Data :
TAC Rating : 4
Category : Malware
Comment :
Rootkey : HKEY_LOCAL_MACHINE
Object : software\microsoft\internet explorer\urlsearchhooks
Value : {CFBFAE00-17A6-11D0-99CB-00C04FD64497}

Conditional scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 2
Objects found so far: 3

18:52:50 Scan Complete

Summary Of This Scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Total scanning time:00:24:40.344
Objects scanned:131108
Objects identified:3
Objects ignored:0
New critical objects:3


*****HIJACK THIS*****

Logfile of HijackThis v1.99.1
Scan saved at 11:03, on 06-10-15
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Hijack\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: Class - {DEBFF58E-E6D7-D68B-85F2-ABDFED9E7DDC} - C:\WINDOWS\epbed1.dll (file missing)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.exe -off
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [THGuard] "C:\Program Files\TrojanHunter 4.6\THGuard.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/...UI.cab46479.cab
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/...dy.cab32846.cab
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/...at.cab32846.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {9D190AE6-C81E-4039-8061-978EBAD10073} (F-Secure Online Scanner 3.0) - http://support.f-sec.../ols3/fscax.cab
O16 - DPF: {B1826A9F-4AA0-4510-BA77-9013E74E4B9B} - http://www.trendmicr...scan/as4web.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn...ro.cab34246.cab
O16 - DPF: {CAC181B0-4D70-402D-B571-C596A47D0CE0} (CBankshotZoneCtrl Class) - http://zone.msn.com/...ol.cab42858.cab
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/...xy.cab41227.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{8F9BC6F1-3416-472F-A132-5CABAF535F3D}: NameServer = 85.255.115.70,85.255.112.138
O17 - HKLM\System\CCS\Services\Tcpip\..\{C092A0D0-3668-47FF-9FB0-6E9D5C122E03}: NameServer = 85.255.115.70,85.255.112.138
O17 - HKLM\System\CCS\Services\Tcpip\..\{DD8187E2-750B-4DF7-81D9-C384C79B75A1}: NameServer = 85.255.115.70,85.255.112.138
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.70 85.255.112.138
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe



Thank you in advance for your help,
Best Regards,


Patrick
  • 0

Advertisements


#2
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Hi Patrick and Welcome to GeekstoGo!

I need you to run the Link Optimizer Removal tool from Symantec first,at present it seems to working pretty good against the version you have infecting your machine.

Read through the link below and follow all the directions,it will produce a log which I will need to see.
http://www.symantec....-092316-4153-99

I want you to run it once in normal mode and save that log,you will want to rename it or move it so it doesnt get over written.

Next,reboot in safe mode and run the tool once more,it should produce another log.


After running the tool,I want you to reboot the machine once more and scan fresh with Ad Aware.

Remove all it finds and generate a fresh log just as you did in the previous post.

When you post back,please include the Symantec Removal tool logs--> Ad Aware log and a fresh HijackThis log.
  • 0

#3
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Good day to you, Monster Sir,

...and thank you for the fast reply !

Unfortunately, I cannot get very far... I tried the link to download the LinkOptimizer. It brings me to the right place onto Symantec website, but whenever I try to download, I get a "The page cannot be displayed" error message.

I rebooted my computer and tried again, but it still doesn't work. I verified my internet setting and everything seems to be fine.

Do you know of an alternative way for me to get the program ?


Patrick
  • 0

#4
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
You can try the one I am attaching to the post but I am not so sure it will run.


If it doesnt run,try one of these sites and the Prevx Removal tool.

Download and run the grozmon removal tool,please.
http://www.prevx.com/gromozon.asp
or
http://pcalsicuro.ph....it/FixGrom.exe

Simple tool to use,just run and follow the prompts,log should be created on your C:\ drive.

Attached Files


  • 0

#5
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Hi Cretemonster,

I was able to extract the file form the attachment, but as you suspected, it won't run.

No luck either with the 2 other links you gave me... I still get the "this page cannot be displayed" error message. I don't mean to sound paranoid, but could it the malware that blocks my access to those programs ???

Can I manually change the parameters of internet explorer (and/or Windows Firewall) to accept these "good connections" ?

I tried to test my internet explorer & it seems I can open any other link, but none of the ones you give me. Also, when my internet connection is opened, I cannot run the TaskManager and if I run it before, as soon as I connect to internet, it blows up to 100% and needs to close.

I wish I could do more to help you help me...


Thank you in advance for your time and effort,

Patrick
  • 0

#6
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Errrrrr!

Its the infection itself preventing you from accessing the sites and the Symantec tool not running.

See if the prevx tool will run,Im attaching it to the post.

Attached Files


  • 0

#7
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Hi,

Woo-Hoo ! I could run the Prevx tool you attached and it did great. After running it, I was able to access the links you gave me earlier and did what you requested.

My computer is alreday working 10 times faster.

Here are the steps I took, the logs follow.

- FixGrom
- FixLinkOpt
- (safe mode) FixLinkOpt
- Ad-Aware - 3 infections
- Ad-Aware - no infection
- Hijack This

*** FixGrom ***

Removal tool loaded into memory
------------------------------------
Executing rootkit removal engine....
------------------------------------
Disabling rootkit file: \\?\C:\WINDOWS\system32\lpt9.mjx
\\?\C:\WINDOWS\system32\lpt9.mjx
Resetting file permissions...
Clearing attributes...
Removing file...
Rootkit removed! Cleaning up...

Removing temp files...
Scanning: C:\WINDOWS
Scanning: C:\Program Files\Common Files
Gromozon-Related Malicious Code Detected!
FileName: C:\WINDOWS\epbed1.dll
Removed!


Trojan.Gromozon Removed!

*** FixLinkOpt (1st run) ***

Symantec Trojan.Linkoptimizer Removal Tool 1.0.2
SeTakeOwnershipPrivilege acquired
SeDebugPrivilege acquired

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012755.dll: (deleted)

Trojan.Linkoptimizer has been successfully removed from your computer!

Here is the report:

The total number of the scanned files: 45492
The number of deleted threat files: 1
The number of threat processes terminated: 0
The number of registry entries fixed: 0

The tool initiated a system reboot.

*** FixLinkOpt (2nd run - Safe mode) ***

Symantec Trojan.Linkoptimizer Removal Tool 1.0.2
SeTakeOwnershipPrivilege acquired
SeDebugPrivilege acquired

Trojan.Linkoptimizer has not been found on your computer.

*** Ad-Aware (1st run) ***

Ad-Aware SE Build 1.06r1
Logfile Created on:06-10-16 19:11:49
Created with Ad-Aware SE Personal, free for private use.
Using definitions file:SE1R126 12.10.2006
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

References detected during the scan:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Adware.LinkOptimizer(TAC index:4):3 total references
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Ad-Aware SE Settings
===========================
Set : Search for low-risk threats
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep-scan registry
Set : Scan my IE Favorites for banned URLs
Set : Scan my Hosts file

Extended Ad-Aware SE Settings
===========================
Set : Unload recognized processes & modules during scan
Set : Scan registry for all users instead of current user only
Set : During removal, unload Explorer and IE if necessary
Set : Let Windows remove files in use at next reboot
Set : Delete quarantined objects after restoring
Set : Include basic Ad-Aware settings in log file
Set : Include additional Ad-Aware settings in log file
Set : Include reference summary in log file
Set : Include alternate data stream details in log file
Set : Play sound at scan completion if scan locates critical objects


06-10-16 19:11:49 - Scan started. (Full System Scan)

Listing running processes
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

#:1 [smss.exe]
FilePath : \SystemRoot\System32\
ProcessID : 524
ThreadCreationTime : 06-10-16 23:10:41
BasePriority : Normal


#:2 [csrss.exe]
FilePath : \??\C:\WINDOWS\system32\
ProcessID : 580
ThreadCreationTime : 06-10-16 23:10:43
BasePriority : Normal


#:3 [winlogon.exe]
FilePath : \??\C:\WINDOWS\system32\
ProcessID : 604
ThreadCreationTime : 06-10-16 23:10:44
BasePriority : High


#:4 [services.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 648
ThreadCreationTime : 06-10-16 23:10:45
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Services and Controller app
InternalName : services.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : services.exe

#:5 [lsass.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 660
ThreadCreationTime : 06-10-16 23:10:45
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : LSA Shell (Export Version)
InternalName : lsass.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : lsass.exe

#:6 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 840
ThreadCreationTime : 06-10-16 23:10:46
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:7 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 888
ThreadCreationTime : 06-10-16 23:10:46
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:8 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 956
ThreadCreationTime : 06-10-16 23:10:46
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:9 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1000
ThreadCreationTime : 06-10-16 23:10:46
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:10 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1140
ThreadCreationTime : 06-10-16 23:10:47
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:11 [spoolsv.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1308
ThreadCreationTime : 06-10-16 23:10:48
BasePriority : Normal
FileVersion : 5.1.2600.2696 (xpsp_sp2_gdr.050610-1519)
ProductVersion : 5.1.2600.2696
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Spooler SubSystem App
InternalName : spoolsv.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : spoolsv.exe

#:12 [guard.exe]
FilePath : C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\
ProcessID : 1496
ThreadCreationTime : 06-10-16 23:10:56
BasePriority : Normal
FileVersion : 7, 5, 0, 47
ProductVersion : 7, 5, 0, 47
ProductName : AVG Anti-Spyware
CompanyName : Anti-Malware Development a.s.
FileDescription : AVG Anti-Spyware guard
InternalName : AVG Anti-Spyware guard
LegalCopyright : Copyright © 2006 Anti-Malware Development a.s.
OriginalFilename : guard.exe

#:13 [avgamsvr.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1508
ThreadCreationTime : 06-10-16 23:10:56
BasePriority : Normal
FileVersion : 7,1,0,365
ProductVersion : 7.1.0.365
ProductName : AVG Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Alert Manager
InternalName : avgamsvr
LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
OriginalFilename : avgamsvr.EXE

#:14 [avgupsvc.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1528
ThreadCreationTime : 06-10-16 23:10:56
BasePriority : Normal
FileVersion : 7,1,0,349
ProductVersion : 7.1.0.349
ProductName : AVG 7.0 Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Update Service
InternalName : avgupsvc
LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
OriginalFilename : avgupdsvc.EXE

#:15 [ctsvccda.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1540
ThreadCreationTime : 06-10-16 23:10:56
BasePriority : Normal
FileVersion : 1.0.1.0
ProductVersion : 1.0.0.0
ProductName : Creative Service for CDROM Access
CompanyName : Creative Technology Ltd
FileDescription : Creative Service for CDROM Access
InternalName : CTsvcCDAEXE
LegalCopyright : Copyright © Creative Technology Ltd., 1999. All rights reserved.
OriginalFilename : CTsvcCDA.EXE

#:16 [mdm.exe]
FilePath : C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\
ProcessID : 1620
ThreadCreationTime : 06-10-16 23:10:57
BasePriority : Normal
FileVersion : 7.00.9466
ProductVersion : 7.00.9466
ProductName : Microsoft® Visual Studio .NET
CompanyName : Microsoft Corporation
FileDescription : Machine Debug Manager
InternalName : mdm.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : mdm.exe

#:17 [nvsvc32.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1772
ThreadCreationTime : 06-10-16 23:10:57
BasePriority : Normal
FileVersion : 6.14.10.5216
ProductVersion : 6.14.10.5216
ProductName : NVIDIA Driver Helper Service, Version 52.16
CompanyName : NVIDIA Corporation
FileDescription : NVIDIA Driver Helper Service, Version 52.16
InternalName : NVSVC
LegalCopyright : © NVIDIA Corporation. All rights reserved.
OriginalFilename : nvsvc32.exe

#:18 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 1912
ThreadCreationTime : 06-10-16 23:10:57
BasePriority : Normal
FileVersion : 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 6.00.2900.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : EXPLORER.EXE

#:19 [wdfmgr.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1968
ThreadCreationTime : 06-10-16 23:10:58
BasePriority : Normal
FileVersion : 5.2.3790.1230 built by: DNSRV(bld4act)
ProductVersion : 5.2.3790.1230
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Windows User Mode Driver Manager
InternalName : WdfMgr
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : WdfMgr.exe

#:20 [mspmspsv.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 2032
ThreadCreationTime : 06-10-16 23:10:58
BasePriority : Normal
FileVersion : 7.01.00.3055
ProductVersion : 7.01.00.3055
ProductName : Microsoft ® DRM
CompanyName : Microsoft Corporation
FileDescription : WMDM PMSP Service
InternalName : MSPMSPSV.EXE
LegalCopyright : Copyright © Microsoft Corp. 1981-2000
OriginalFilename : MSPMSPSV.EXE

#:21 [itouch.exe]
FilePath : C:\Program Files\Logitech\iTouch\
ProcessID : 624
ThreadCreationTime : 06-10-16 23:11:01
BasePriority : Normal
FileVersion : 2.10.159
ProductVersion : 2.10
ProductName : iTouch
CompanyName : Logitech Inc.
FileDescription : iTouch Application
InternalName : iTouch
LegalCopyright : © 1998-2002 Logitech. All rights reserved.
LegalTrademarks : Logitech® and iTouch® are registered trademarks of Logitech Inc.
OriginalFilename : iTouch.exe
Comments :

#:22 [em_exec.exe]
FilePath : C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\
ProcessID : 776
ThreadCreationTime : 06-10-16 23:11:01
BasePriority : Normal
FileVersion : 9.71.218
ProductVersion : 9.71
ProductName : MouseWare
CompanyName : Logitech Inc.
FileDescription : Control Center
InternalName : EM_EXEC
LegalCopyright : Copyright © Logitech Inc. 1987-2002.
LegalTrademarks : Logitech® and MouseWare® are registered trademarks of Logitech Inc.
OriginalFilename : EM_EXEC.CPP
Comments : Created by the MouseWare Team

#:23 [ituneshelper.exe]
FilePath : C:\Program Files\iTunes\
ProcessID : 932
ThreadCreationTime : 06-10-16 23:11:02
BasePriority : Normal
FileVersion : 4.7.0.42
ProductVersion : 4.7.0.42
ProductName : iTunes
CompanyName : Apple Computer, Inc.
FileDescription : iTunesHelper Module
InternalName : iTunesHelper
LegalCopyright : © 2003-2004 Apple Computer, Inc. All Rights Reserved.
OriginalFilename : iTunesHelper.exe

#:24 [qttask.exe]
FilePath : C:\Program Files\QuickTime\
ProcessID : 980
ThreadCreationTime : 06-10-16 23:11:02
BasePriority : Normal
FileVersion : 6.5.1
ProductVersion : QuickTime 6.5.1
ProductName : QuickTime
CompanyName : Apple Computer, Inc.
InternalName : QuickTime Task
LegalCopyright : © Apple Computer, Inc. 2001-2004
OriginalFilename : QTTask.exe

#:25 [avgcc.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1016
ThreadCreationTime : 06-10-16 23:11:02
BasePriority : Normal
FileVersion : 7,1,0,406
ProductVersion : 7.1.0.406
ProductName : AVG Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Control Center
InternalName : AvgCC
LegalCopyright : Copyright © 2006, GRISOFT, s.r.o.
OriginalFilename : AvgCC.EXE

#:26 [avgas.exe]
FilePath : C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\
ProcessID : 1052
ThreadCreationTime : 06-10-16 23:11:03
BasePriority : Normal
FileVersion : 7, 5, 0, 50
ProductVersion : 7, 5, 0, 50
ProductName : AVG Anti-Spyware
CompanyName : Anti-Malware Development a.s.
FileDescription : AVG Anti-Spyware
InternalName : AVG Anti-Spyware
LegalCopyright : Copyright © 2006 Anti-Malware Development a.s.
OriginalFilename : avgas.exe

#:27 [googletoolbarnotifier.exe]
FilePath : C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\
ProcessID : 1088
ThreadCreationTime : 06-10-16 23:11:03
BasePriority : Normal
FileVersion : 1, 0, 720, 3640
ProductVersion : 1, 0, 720, 3640
ProductName : GoogleToolbarNotifier
CompanyName : Google Inc.
FileDescription : GoogleToolbarNotifier
LegalCopyright : Copyright © 2005-2006
OriginalFilename : GoogleToolbarNotifier.exe

#:28 [acrotray.exe]
FilePath : C:\Program Files\Adobe\Acrobat 6.0\Distillr\
ProcessID : 1848
ThreadCreationTime : 06-10-16 23:11:05
BasePriority : Normal
FileVersion : 6.0.0.2003051500
ProductVersion : 6.0.0.0
ProductName : AcroTray - Adobe Acrobat Distiller helper application.
CompanyName : Adobe Systems Inc.
FileDescription : AcroTray
InternalName : AcroTray
LegalCopyright : Copyright 1984-2003 Adobe Systems Incorporated and its licensors. All rights reserved.
OriginalFilename : AcroTray.exe

#:29 [ipodservice.exe]
FilePath : C:\Program Files\iPod\bin\
ProcessID : 1688
ThreadCreationTime : 06-10-16 23:11:05
BasePriority : Normal
FileVersion : 4.7.0.42
ProductVersion : 4.7.0.42
ProductName : iTunes
CompanyName : Apple Computer, Inc.
FileDescription : iPodService Module
InternalName : iPodService
LegalCopyright : © 2003-2004 Apple Computer, Inc. All Rights Reserved.
OriginalFilename : iPodService.exe

#:30 [alg.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 2060
ThreadCreationTime : 06-10-16 23:11:05
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Application Layer Gateway Service
InternalName : ALG.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : ALG.exe

#:31 [wgatray.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 2516
ThreadCreationTime : 06-10-16 23:11:11
BasePriority : Normal
FileVersion : 1.5.0540.0
ProductVersion : 1.5.0540.0
ProductName : Windows Genuine Advantage
CompanyName : Microsoft Corporation
FileDescription : Windows Genuine Advantage Notification
InternalName : WgaNotify
LegalCopyright : © 1995-2006 Microsoft Corporation
OriginalFilename : WgaTray.exe

#:32 [wmiprvse.exe]
FilePath : C:\WINDOWS\System32\wbem\
ProcessID : 2564
ThreadCreationTime : 06-10-16 23:11:12
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : WMI
InternalName : Wmiprvse.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : Wmiprvse.exe

#:33 [ad-aware.exe]
FilePath : C:\Ad-Aware SE Personal\
ProcessID : 2904
ThreadCreationTime : 06-10-16 23:11:30
BasePriority : Normal
FileVersion : 6.2.0.236
ProductVersion : SE 106
ProductName : Lavasoft Ad-Aware SE
CompanyName : Lavasoft Sweden
FileDescription : Ad-Aware SE Core application
InternalName : Ad-Aware.exe
LegalCopyright : Copyright © Lavasoft AB Sweden
OriginalFilename : Ad-Aware.exe
Comments : All Rights Reserved

#:34 [wuauclt.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 3088
ThreadCreationTime : 06-10-16 23:11:47
BasePriority : Normal
FileVersion : 5.8.0.2469 built by: lab01_n(wmbla)
ProductVersion : 5.8.0.2469
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Automatic Updates
InternalName : wuauclt.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : wuauclt.exe

Memory scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0


Started registry scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Adware.LinkOptimizer Object Recognized!
Type : Regkey
Data :
TAC Rating : 4
Category : Malware
Comment :
Rootkey : HKEY_CLASSES_ROOT
Object : clsid\{e3a77057-d10b-b02a-d823-22e020c583b5}

Registry Scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 1
Objects found so far: 1


Started deep registry scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Deep registry scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 1


Started Tracking Cookie scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


Tracking cookie scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 1



Deep scanning and examining files (C:)
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Disk Scan Result for C:\
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 1


Scanning Hosts file......
Hosts file location:"C:\WINDOWS\system32\drivers\etc\hosts".
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Hosts file scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
1 entries scanned.
New critical objects:0
Objects found so far: 1




Performing conditional scans...
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Adware.LinkOptimizer Object Recognized!
Type : Regkey
Data :
TAC Rating : 4
Category : Malware
Comment :
Rootkey : HKEY_LOCAL_MACHINE
Object : software\microsoft\internet explorer\urlsearchhooks

Adware.LinkOptimizer Object Recognized!
Type : RegValue
Data :
TAC Rating : 4
Category : Malware
Comment :
Rootkey : HKEY_LOCAL_MACHINE
Object : software\microsoft\internet explorer\urlsearchhooks
Value : {CFBFAE00-17A6-11D0-99CB-00C04FD64497}

Conditional scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 2
Objects found so far: 3

19:34:44 Scan Complete

Summary Of This Scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Total scanning time:00:22:55.235
Objects scanned:134377
Objects identified:3
Objects ignored:0
New critical objects:3


*** Ad-Aware (2nd run - after restart) ***

Ad-Aware SE Build 1.06r1
Logfile Created on:06-10-16 19:42:32
Created with Ad-Aware SE Personal, free for private use.
Using definitions file:SE1R126 12.10.2006
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

References detected during the scan:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
None
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Ad-Aware SE Settings
===========================
Set : Search for low-risk threats
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep-scan registry
Set : Scan my IE Favorites for banned URLs
Set : Scan my Hosts file

Extended Ad-Aware SE Settings
===========================
Set : Unload recognized processes & modules during scan
Set : Scan registry for all users instead of current user only
Set : During removal, unload Explorer and IE if necessary
Set : Let Windows remove files in use at next reboot
Set : Delete quarantined objects after restoring
Set : Include basic Ad-Aware settings in log file
Set : Include additional Ad-Aware settings in log file
Set : Include reference summary in log file
Set : Include alternate data stream details in log file
Set : Play sound at scan completion if scan locates critical objects


06-10-16 19:42:32 - Scan started. (Full System Scan)

Listing running processes
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

#:1 [smss.exe]
FilePath : \SystemRoot\System32\
ProcessID : 524
ThreadCreationTime : 06-10-16 23:40:21
BasePriority : Normal


#:2 [csrss.exe]
FilePath : \??\C:\WINDOWS\system32\
ProcessID : 580
ThreadCreationTime : 06-10-16 23:40:23
BasePriority : Normal


#:3 [winlogon.exe]
FilePath : \??\C:\WINDOWS\system32\
ProcessID : 604
ThreadCreationTime : 06-10-16 23:40:24
BasePriority : High


#:4 [services.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 648
ThreadCreationTime : 06-10-16 23:40:25
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Services and Controller app
InternalName : services.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : services.exe

#:5 [lsass.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 660
ThreadCreationTime : 06-10-16 23:40:25
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : LSA Shell (Export Version)
InternalName : lsass.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : lsass.exe

#:6 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 840
ThreadCreationTime : 06-10-16 23:40:26
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:7 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 888
ThreadCreationTime : 06-10-16 23:40:26
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:8 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 956
ThreadCreationTime : 06-10-16 23:40:26
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:9 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1008
ThreadCreationTime : 06-10-16 23:40:26
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:10 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1184
ThreadCreationTime : 06-10-16 23:40:28
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : svchost.exe

#:11 [spoolsv.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1284
ThreadCreationTime : 06-10-16 23:40:29
BasePriority : Normal
FileVersion : 5.1.2600.2696 (xpsp_sp2_gdr.050610-1519)
ProductVersion : 5.1.2600.2696
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Spooler SubSystem App
InternalName : spoolsv.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : spoolsv.exe

#:12 [guard.exe]
FilePath : C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\
ProcessID : 1436
ThreadCreationTime : 06-10-16 23:40:36
BasePriority : Normal
FileVersion : 7, 5, 0, 47
ProductVersion : 7, 5, 0, 47
ProductName : AVG Anti-Spyware
CompanyName : Anti-Malware Development a.s.
FileDescription : AVG Anti-Spyware guard
InternalName : AVG Anti-Spyware guard
LegalCopyright : Copyright © 2006 Anti-Malware Development a.s.
OriginalFilename : guard.exe

#:13 [avgamsvr.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1448
ThreadCreationTime : 06-10-16 23:40:36
BasePriority : Normal
FileVersion : 7,1,0,365
ProductVersion : 7.1.0.365
ProductName : AVG Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Alert Manager
InternalName : avgamsvr
LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
OriginalFilename : avgamsvr.EXE

#:14 [avgupsvc.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 1460
ThreadCreationTime : 06-10-16 23:40:36
BasePriority : Normal
FileVersion : 7,1,0,349
ProductVersion : 7.1.0.349
ProductName : AVG 7.0 Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Update Service
InternalName : avgupsvc
LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
OriginalFilename : avgupdsvc.EXE

#:15 [ctsvccda.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1484
ThreadCreationTime : 06-10-16 23:40:36
BasePriority : Normal
FileVersion : 1.0.1.0
ProductVersion : 1.0.0.0
ProductName : Creative Service for CDROM Access
CompanyName : Creative Technology Ltd
FileDescription : Creative Service for CDROM Access
InternalName : CTsvcCDAEXE
LegalCopyright : Copyright © Creative Technology Ltd., 1999. All rights reserved.
OriginalFilename : CTsvcCDA.EXE

#:16 [mdm.exe]
FilePath : C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\
ProcessID : 1564
ThreadCreationTime : 06-10-16 23:40:37
BasePriority : Normal
FileVersion : 7.00.9466
ProductVersion : 7.00.9466
ProductName : Microsoft® Visual Studio .NET
CompanyName : Microsoft Corporation
FileDescription : Machine Debug Manager
InternalName : mdm.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : mdm.exe

#:17 [nvsvc32.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1624
ThreadCreationTime : 06-10-16 23:40:37
BasePriority : Normal
FileVersion : 6.14.10.5216
ProductVersion : 6.14.10.5216
ProductName : NVIDIA Driver Helper Service, Version 52.16
CompanyName : NVIDIA Corporation
FileDescription : NVIDIA Driver Helper Service, Version 52.16
InternalName : NVSVC
LegalCopyright : © NVIDIA Corporation. All rights reserved.
OriginalFilename : nvsvc32.exe

#:18 [wdfmgr.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1744
ThreadCreationTime : 06-10-16 23:40:37
BasePriority : Normal
FileVersion : 5.2.3790.1230 built by: DNSRV(bld4act)
ProductVersion : 5.2.3790.1230
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Windows User Mode Driver Manager
InternalName : WdfMgr
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : WdfMgr.exe

#:19 [mspmspsv.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 1808
ThreadCreationTime : 06-10-16 23:40:37
BasePriority : Normal
FileVersion : 7.01.00.3055
ProductVersion : 7.01.00.3055
ProductName : Microsoft ® DRM
CompanyName : Microsoft Corporation
FileDescription : WMDM PMSP Service
InternalName : MSPMSPSV.EXE
LegalCopyright : Copyright © Microsoft Corp. 1981-2000
OriginalFilename : MSPMSPSV.EXE

#:20 [alg.exe]
FilePath : C:\WINDOWS\System32\
ProcessID : 224
ThreadCreationTime : 06-10-16 23:40:41
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Application Layer Gateway Service
InternalName : ALG.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : ALG.exe

#:21 [wgatray.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 1000
ThreadCreationTime : 06-10-16 23:41:13
BasePriority : Normal
FileVersion : 1.5.0540.0
ProductVersion : 1.5.0540.0
ProductName : Windows Genuine Advantage
CompanyName : Microsoft Corporation
FileDescription : Windows Genuine Advantage Notification
InternalName : WgaNotify
LegalCopyright : © 1995-2006 Microsoft Corporation
OriginalFilename : WgaTray.exe

#:22 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 1048
ThreadCreationTime : 06-10-16 23:41:13
BasePriority : Normal
FileVersion : 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 6.00.2900.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : EXPLORER.EXE

#:23 [wmiprvse.exe]
FilePath : C:\WINDOWS\System32\wbem\
ProcessID : 1312
ThreadCreationTime : 06-10-16 23:41:14
BasePriority : Normal
FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
ProductVersion : 5.1.2600.2180
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : WMI
InternalName : Wmiprvse.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : Wmiprvse.exe

#:24 [itouch.exe]
FilePath : C:\Program Files\Logitech\iTouch\
ProcessID : 2044
ThreadCreationTime : 06-10-16 23:41:16
BasePriority : Normal
FileVersion : 2.10.159
ProductVersion : 2.10
ProductName : iTouch
CompanyName : Logitech Inc.
FileDescription : iTouch Application
InternalName : iTouch
LegalCopyright : © 1998-2002 Logitech. All rights reserved.
LegalTrademarks : Logitech® and iTouch® are registered trademarks of Logitech Inc.
OriginalFilename : iTouch.exe
Comments :

#:25 [em_exec.exe]
FilePath : C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\
ProcessID : 288
ThreadCreationTime : 06-10-16 23:41:16
BasePriority : Normal
FileVersion : 9.71.218
ProductVersion : 9.71
ProductName : MouseWare
CompanyName : Logitech Inc.
FileDescription : Control Center
InternalName : EM_EXEC
LegalCopyright : Copyright © Logitech Inc. 1987-2002.
LegalTrademarks : Logitech® and MouseWare® are registered trademarks of Logitech Inc.
OriginalFilename : EM_EXEC.CPP
Comments : Created by the MouseWare Team

#:26 [ituneshelper.exe]
FilePath : C:\Program Files\iTunes\
ProcessID : 308
ThreadCreationTime : 06-10-16 23:41:16
BasePriority : Normal
FileVersion : 4.7.0.42
ProductVersion : 4.7.0.42
ProductName : iTunes
CompanyName : Apple Computer, Inc.
FileDescription : iTunesHelper Module
InternalName : iTunesHelper
LegalCopyright : © 2003-2004 Apple Computer, Inc. All Rights Reserved.
OriginalFilename : iTunesHelper.exe

#:27 [qttask.exe]
FilePath : C:\Program Files\QuickTime\
ProcessID : 376
ThreadCreationTime : 06-10-16 23:41:17
BasePriority : Normal
FileVersion : 6.5.1
ProductVersion : QuickTime 6.5.1
ProductName : QuickTime
CompanyName : Apple Computer, Inc.
InternalName : QuickTime Task
LegalCopyright : © Apple Computer, Inc. 2001-2004
OriginalFilename : QTTask.exe

#:28 [avgcc.exe]
FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
ProcessID : 404
ThreadCreationTime : 06-10-16 23:41:17
BasePriority : Normal
FileVersion : 7,1,0,406
ProductVersion : 7.1.0.406
ProductName : AVG Anti-Virus System
CompanyName : GRISOFT, s.r.o.
FileDescription : AVG Control Center
InternalName : AvgCC
LegalCopyright : Copyright © 2006, GRISOFT, s.r.o.
OriginalFilename : AvgCC.EXE

#:29 [avgas.exe]
FilePath : C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\
ProcessID : 392
ThreadCreationTime : 06-10-16 23:41:17
BasePriority : Normal
FileVersion : 7, 5, 0, 50
ProductVersion : 7, 5, 0, 50
ProductName : AVG Anti-Spyware
CompanyName : Anti-Malware Development a.s.
FileDescription : AVG Anti-Spyware
InternalName : AVG Anti-Spyware
LegalCopyright : Copyright © 2006 Anti-Malware Development a.s.
OriginalFilename : avgas.exe

#:30 [googletoolbarnotifier.exe]
FilePath : C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\
ProcessID : 1916
ThreadCreationTime : 06-10-16 23:41:17
BasePriority : Normal
FileVersion : 1, 0, 720, 3640
ProductVersion : 1, 0, 720, 3640
ProductName : GoogleToolbarNotifier
CompanyName : Google Inc.
FileDescription : GoogleToolbarNotifier
LegalCopyright : Copyright © 2005-2006
OriginalFilename : GoogleToolbarNotifier.exe

#:31 [acrotray.exe]
FilePath : C:\Program Files\Adobe\Acrobat 6.0\Distillr\
ProcessID : 508
ThreadCreationTime : 06-10-16 23:41:17
BasePriority : Normal
FileVersion : 6.0.0.2003051500
ProductVersion : 6.0.0.0
ProductName : AcroTray - Adobe Acrobat Distiller helper application.
CompanyName : Adobe Systems Inc.
FileDescription : AcroTray
InternalName : AcroTray
LegalCopyright : Copyright 1984-2003 Adobe Systems Incorporated and its licensors. All rights reserved.
OriginalFilename : AcroTray.exe

#:32 [ipodservice.exe]
FilePath : C:\Program Files\iPod\bin\
ProcessID : 1900
ThreadCreationTime : 06-10-16 23:41:17
BasePriority : Normal
FileVersion : 4.7.0.42
ProductVersion : 4.7.0.42
ProductName : iTunes
CompanyName : Apple Computer, Inc.
FileDescription : iPodService Module
InternalName : iPodService
LegalCopyright : © 2003-2004 Apple Computer, Inc. All Rights Reserved.
OriginalFilename : iPodService.exe

#:33 [wuauclt.exe]
FilePath : C:\WINDOWS\system32\
ProcessID : 2352
ThreadCreationTime : 06-10-16 23:41:26
BasePriority : Normal
FileVersion : 5.8.0.2469 built by: lab01_n(wmbla)
ProductVersion : 5.8.0.2469
ProductName : Microsoft® Windows® Operating System
CompanyName : Microsoft Corporation
FileDescription : Automatic Updates
InternalName : wuauclt.exe
LegalCopyright : © Microsoft Corporation. All rights reserved.
OriginalFilename : wuauclt.exe

#:34 [ad-aware.exe]
FilePath : C:\Ad-Aware SE Personal\
ProcessID : 3016
ThreadCreationTime : 06-10-16 23:42:12
BasePriority : Normal
FileVersion : 6.2.0.236
ProductVersion : SE 106
ProductName : Lavasoft Ad-Aware SE
CompanyName : Lavasoft Sweden
FileDescription : Ad-Aware SE Core application
InternalName : Ad-Aware.exe
LegalCopyright : Copyright © Lavasoft AB Sweden
OriginalFilename : Ad-Aware.exe
Comments : All Rights Reserved

Memory scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0


Started registry scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Registry Scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0


Started deep registry scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Deep registry scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0


Started Tracking Cookie scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


Tracking cookie scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0



Deep scanning and examining files (C:)
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Disk Scan Result for C:\
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
New critical objects: 0
Objects found so far: 0


Scanning Hosts file......
Hosts file location:"C:\WINDOWS\system32\drivers\etc\hosts".
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

Hosts file scan result:
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
1 entries scanned.
New critical objects:0
Objects found so far: 0


20:05:01 Scan Complete

Summary Of This Scan
»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Total scanning time:00:22:28.860
Objects scanned:133859
Objects identified:0
Objects ignored:0
New critical objects:0


*** HijackThis ***

Logfile of HijackThis v1.99.1
Scan saved at 20:06, on 06-10-16
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Hijack\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://sympatico.msn.ca/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: Class - {DEBFF58E-E6D7-D68B-85F2-ABDFED9E7DDC} - C:\WINDOWS\epbed1.dll (file missing)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.exe -off
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/...UI.cab46479.cab
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/...dy.cab32846.cab
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/...at.cab32846.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {9D190AE6-C81E-4039-8061-978EBAD10073} (F-Secure Online Scanner 3.0) - http://support.f-sec.../ols3/fscax.cab
O16 - DPF: {B1826A9F-4AA0-4510-BA77-9013E74E4B9B} - http://www.trendmicr...scan/as4web.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn...ro.cab34246.cab
O16 - DPF: {CAC181B0-4D70-402D-B571-C596A47D0CE0} (CBankshotZoneCtrl Class) - http://zone.msn.com/...ol.cab42858.cab
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/...xy.cab41227.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{8F9BC6F1-3416-472F-A132-5CABAF535F3D}: NameServer = 85.255.115.70,85.255.112.138
O17 - HKLM\System\CCS\Services\Tcpip\..\{C092A0D0-3668-47FF-9FB0-6E9D5C122E03}: NameServer = 85.255.115.70,85.255.112.138
O17 - HKLM\System\CCS\Services\Tcpip\..\{DD8187E2-750B-4DF7-81D9-C384C79B75A1}: NameServer = 85.255.115.70,85.255.112.138
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.70 85.255.112.138
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe



Everything is much better now, but I will leave the diagnosis to the expert...

Best regards,

Patrick
  • 0

#8
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Excellent Work!! :whistling:

Now lets get rid of that DNS Hijacker before everything else is reinstalled.


Please download FixWareout from one of these sites:
http://downloads.sub.../Fixwareout.exe
http://www.bleepingc.../Fixwareout.exe
  • Save it to your desktop and run it. Click Next, then Install, make sure "Run fixit" is checked and click Finish.
  • The fix will begin; follow the prompts.
  • You will be asked to reboot your computer,
  • Your system may take longer than usual to load; this is normal.
  • Report.txt should be generated when the fix is completed.
  • Once the desktop loads-> Open HijackThis-> Click "Do a System Scan Only" and put a check by these but DO NOT hit the Fix Checked button yet

    O2 - BHO: Class - {DEBFF58E-E6D7-D68B-85F2-ABDFED9E7DDC} - C:\WINDOWS\epbed1.dll (file missing)

    O17 - HKLM\System\CCS\Services\Tcpip\..\{8F9BC6F1-3416-472F-A132-5CABAF535F3D}: NameServer = 85.255.115.70,85.255.112.138

    O17 - HKLM\System\CCS\Services\Tcpip\..\{C092A0D0-3668-47FF-9FB0-6E9D5C122E03}: NameServer = 85.255.115.70,85.255.112.138

    O17 - HKLM\System\CCS\Services\Tcpip\..\{DD8187E2-750B-4DF7-81D9-C384C79B75A1}: NameServer = 85.255.115.70,85.255.112.138

    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.70 85.255.112.138

    Now Make sure ALL WINDOWS and BROWSERS are CLOSED and hit the Fix Checked Button


Now open the Control Panel-> In the windows control panel. If you are using Windows XP's Category View, select the Network and Internet Connections category otherwise double click on Network Connections. Then right click on your default connection, usually local area connection for cable and dsl, and left click on properties. Click the Networking tab. Double-click on the Internet Protocol (TCP/IP) item and select the radio dial that says Obtain DNS servers automatically

Press OK twice to get out of the properties screen and reboot if it asks.
That option might not be avaiable one some systems.


Click Start--> Click Run--> Type in cmd and Click OK.

Type in or copy&paste each command below,one at a time,into the command prompt window and hit enter.

ipconfig /release

ipconfig /flushdns

ipconfig /renew



Restart the Computer and post back with a fresh HijackThis log and Report.txt


After posting those 2 log,Please run the F-Secure Online Scanner

Note: This Scanner is for Internet Explorer Only!
  • Follow the Instruction on the F-Secure page for proper installation.
  • Accept the License Agreement.
  • Once the ActiveX installs,Click Full System Scan
  • Once the download completes,the scan will begin automatically.
  • The scan will take some time to finish,so please be patient.
  • When the scan completes, click the Automatic cleaning (recommended) button.
  • Click the Show Report button and Copy&Paste the entire report in your next reply.

  • 0

#9
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Hi,

Everything went fine. Here are the requested logs.

*** FixWareout ***

Fixwareout ver 1.003
Last edited 8/11/2006
Post this report in the forums please

Reg Entries that were deleted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls\0mdm
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls\1mdm
...

Microsoft ® Windows Script Host Version 5.6
Random Runs removed from HKLM
...

PLEASE NOTE, There WILL be LEGITIMATE FILES LISTED. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.

»»»»» Searching by size/names...

»»»»»
Search five digit cs, dm and jb files.
This WILL/CAN also list Legit Files, Submit them at Virustotal
C:\WINDOWS\SYSTEM32\CSJJB.EXE 51,800 2006-09-25

Other suspects.
Directory of C:\WINDOWS\system32

»»»»» Misc files.

»»»»» Checking for older varients covered by the Rem3 tool.

*** HijackThis ***

Logfile of HijackThis v1.99.1
Scan saved at 19:22, on 06-10-17
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Hijack\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.exe -off
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/...UI.cab46479.cab
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/...dy.cab32846.cab
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/...at.cab32846.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {9D190AE6-C81E-4039-8061-978EBAD10073} (F-Secure Online Scanner 3.0) - http://support.f-sec.../ols3/fscax.cab
O16 - DPF: {B1826A9F-4AA0-4510-BA77-9013E74E4B9B} - http://www.trendmicr...scan/as4web.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn...ro.cab34246.cab
O16 - DPF: {CAC181B0-4D70-402D-B571-C596A47D0CE0} (CBankshotZoneCtrl Class) - http://zone.msn.com/...ol.cab42858.cab
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/...xy.cab41227.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe


As instructed, a log of F-Secure Online Scanner will follow shortly.


Best Regards,

Patrick
  • 0

#10
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Here is the F-Secure Log :


Scanning Report
Tuesday, October 17, 2006 19:38:08 - 20:17:18
Computer name: JULIE
Scanning type: Scan system for viruses, rootkits, spyware
Target: C:\


--------------------------------------------------------------------------------

Result: 1 malware found
Tracking Cookie (spyware)
System (Disinfected)

--------------------------------------------------------------------------------

Statistics
Scanned:
Files: 22440
System: 4034
Not scanned: 4
Actions:
Disinfected: 1
Renamed: 0
Deleted: 0
None: 0
Submitted: 0
Files not scanned:
C:\PAGEFILE.SYS
C:\WINDOWS\SOFTWAREDISTRIBUTION\EVENTCACHE\{87604D87-015B-486B-8BAA-830E0E3BE6FC}.BIN
C:\WINDOWS\SYSTEM32\DRIVERS\ATAPI.SYS
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT

--------------------------------------------------------------------------------

Options
Scanning engines:
F-Secure AVP: 6.0.171, 2006-10-17
F-Secure Libra: 2.4.1, 2006-10-17
F-Secure Blacklight: 1.0.31, 0000-00-00
F-Secure Orion: 1.2.37, 2006-10-16
F-Secure Draco: 1.0.35, 0259-24-212
F-Secure Pegasus: 1.19.0, 2006-08-29
Scanning options:
Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML ZIP XXX
Use Advanced heuristics

--------------------------------------------------------------------------------

Copyright © 1998-2006 Product support |Send virus sample to F-Secure
F-Secure assumes no responsibility for material created or published by third parties that F-Secure World Wide Web pages have a link to. Unless you have clearly stated otherwise, by submitting material to any of our servers, for example by E-mail or via our F-Secure's CGI E-mail, you agree that the material you make available may be published in the F-Secure World Wide Pages or hard-copy publications. You will reach F-Secure public web site by clicking on underlined links. While doing this, your access will be logged to our private access statistics with your domain name.This information will not be given to any third party. You agree not to take action against us in relation to material that you submit. Unless you have clearly stated otherwise, by submitting material you warrant that F-Secure may incorporate any concepts described in it in the F-Secure products/publications without liability.



Thank you,
Best Regards,

Patrick
  • 0

Advertisements


#11
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Hopefully the machine is acting better today.


Make sure Windows is Showing Hidden Files
http://www.bleepingc...al62.html#winxp

Locate and Delete this file

C:\WINDOWS\SYSTEM32\CSJJB.EXE


Please download Combofix to your desktop.
http://download.blee...Bs/combofix.exe

Doubleclick combo.exe to launch the application.

Follow the prompts that will be displayed on the screen.

Don't click on the window while the fix is running, because that will cause your system to hang.

When finished, it should produce a log, combofix.txt

Please post that log in the next reply along with the log from ComboFix.



You can delete the Prevx and Symantec tools we used.


Please run the Bit Defender Online Scan
http://www.bitdefend...m/scan8/ie.html

You must use Internet Explorer for this scanner.

Install the ActiveX and Click on "Click here to Scan"

Allow it to update and Scan the Machine.

It should disinfect or delete whatever it finds that is infected.

Save the report in generates in a text format please and post it back here
  • 0

#12
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Hi,

Yes, the computer is running much faster and much better. It is all thanks to you.

I deleted the C:\WINDOWS\SYSTEM32\CSJJB.EXE file.

As instructed, please find the following logs : ComboFix, BitDefender (you requested a txt log, but I find it so hard to read, so I copied the HTML log. Following is the TXT version if you really prefer it...). I also took the liberty of including a fresh Hijack this log.


*** ComboFix ***

PatMan - 06-10-18 17:23:53.70 Service Pack 2
ComboFix 06.10.16 - Running from: "C:\Documents and Settings\PatMan\Desktop"

((((((((((((((((((((((((((((((( Files Created from 2006-09-18 to 2006-10-18 ))))))))))))))))))))))))))))))))))


2006-10-12 20:29 3,968 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
2006-10-03 21:31 53,248 --a------ C:\WINDOWS\system32\Process.exe
2006-10-03 21:31 40,960 --a------ C:\WINDOWS\system32\swsc.exe
2006-10-03 21:31 288,417 --a------ C:\WINDOWS\system32\SrchSTS.exe
2006-10-03 21:31 135,168 --a------ C:\WINDOWS\system32\swreg.exe
2006-10-01 22:45 12,288 --a------ C:\WINDOWS\system32\wtug.dll


(((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


2006-10-12 21:57 0 --a------ C:\WINDOWS\system32\dmnmd.exe
2006-09-28 18:22 778656 --a------ C:\WINDOWS\system32\drivers\avg7core.sys
2006-09-13 01:01 1084416 --a------ C:\WINDOWS\system32\msxml3.dll
2006-08-25 11:45 617472 --a------ C:\WINDOWS\system32\comctl32.dll
2006-08-21 08:21 16896 --a------ C:\WINDOWS\system32\fltlib.dll
2006-08-21 05:14 23040 --a------ C:\WINDOWS\system32\fltmc.exe
2006-08-21 05:14 128896 --------- C:\WINDOWS\system32\drivers\fltmgr.sys
2006-08-16 07:58 100352 --a------ C:\WINDOWS\system32\6to4svc.dll
2006-07-27 09:24 679424 --a------ C:\WINDOWS\system32\inetcomm.dll
2006-07-21 04:24 72704 --a------ C:\WINDOWS\system32\hlink.dll


(((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

*Note* empty entries are not shown

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
"swg"="C:\\Program Files\\Google\\GoogleToolbarNotifier\\1.0.720.3640\\GoogleToolbarNotifier.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"NvCplDaemon"="RUNDLL32.EXE C:\\WINDOWS\\System32\\NvCpl.dll,NvStartup"
"nwiz"="nwiz.exe /install"
"zBrowser Launcher"="C:\\Program Files\\Logitech\\iTouch\\iTouch.exe"
"EM_EXEC"="C:\\PROGRA~1\\Logitech\\MOUSEW~1\\SYSTEM\\EM_EXEC.EXE"
"TCASUTIEXE"="TCAUDIAG.exe -off"
"iTunesHelper"="C:\\Program Files\\iTunes\\iTunesHelper.exe"
"QuickTime Task"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"AVG7_CC"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgcc.exe /STARTUP"
"!AVG Anti-Spyware"="\"C:\\Program Files\\Grisoft\\AVG Anti-Spyware 7.5\\avgas.exe\" /minimized"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
"Installed"="1"

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components]
"DeskHtmlVersion"=dword:00000110
"DeskHtmlMinorVersion"=dword:00000005
"Settings"=dword:00000001
"GeneralFlags"=dword:00000005

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"
"Flags"=dword:00000002
"Position"=hex:2c,00,00,00,cc,00,00,00,00,00,00,00,34,03,00,00,e2,02,00,00,00,\
00,00,00,01,00,00,00,01,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00
"CurrentState"=hex:04,00,00,40
"OriginalStateInfo"=hex:18,00,00,00,cc,00,00,00,00,00,00,00,34,03,00,00,e2,02,\
00,00,04,00,00,40
"RestoredStateInfo"=hex:18,00,00,00,cc,00,00,00,00,00,00,00,34,03,00,00,e2,02,\
00,00,01,00,00,00

[HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
"CTFMON.EXE"="C:\\WINDOWS\\System32\\CTFMON.EXE"
"AVG7_Run"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\run]
"CTFMON.EXE"="C:\\WINDOWS\\System32\\CTFMON.EXE"
"AVG7_Run"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{AEB6717E-7E19-11d0-97EE-00C04FD91972}"=""
"{57B86673-276A-48B2-BAE7-C6DBB3020EB8}"="AVG Anti-Spyware 7.5"

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"NoColorChoice"=dword:00000000
"NoSizeChoice"=dword:00000000
"NoDispScrSavPage"=dword:00000000
"NoDispCPL"=dword:00000000
"NoVisualStyleChoice"=dword:00000000
"NoDispSettingsPage"=dword:00000000
"NoDispAppearancePage"=dword:00000000
"NoDispBackgroundPage"=dword:00000000

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000091
"NoActiveDesktop"=dword:00000000
"NoSaveSettings"=dword:00000000
"ClassicShell"=dword:00000000
"NoThemesTab"=dword:00000000
"ForceActiveDesktopOn"=dword:00000000

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\Run]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"dontdisplaylastusername"=dword:00000000
"legalnoticecaption"=""
"legalnoticetext"=""
"shutdownwithoutlogon"=dword:00000001
"undockwithoutlogon"=dword:00000001
"DisableTaskMgr"=dword:00000000

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoActiveDesktopChanges"=dword:00000000

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000091

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000091

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload]
"PostBootReminder"="{7849596a-48ea-486e-8937-a2a3009f31a9}"
"CDBurn"="{fbeb8a05-beee-4442-804e-409d6c4515e9}"
"WebCheck"="{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"
"SysTray"="{35CEC8A3-2BE6-11D2-8773-92E220524153}"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
"SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, zwebauth.dll"



~ ~ ~ ~ ~ ~ ~ ~ Hijackthis Backups ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~

backup-20061017-191510-143
O17 - HKLM\System\CCS\Services\Tcpip\..\{DD8187E2-750B-4DF7-81D9-C384C79B75A1}: NameServer = 85.255.115.70,85.255.112.138
backup-20061017-191510-395
O2 - BHO: Class - {DEBFF58E-E6D7-D68B-85F2-ABDFED9E7DDC} - C:\WINDOWS\epbed1.dll (file missing)
backup-20061017-191510-968
O17 - HKLM\System\CCS\Services\Tcpip\..\{8F9BC6F1-3416-472F-A132-5CABAF535F3D}: NameServer = 85.255.115.70,85.255.112.138
backup-20061017-191510-748
O17 - HKLM\System\CCS\Services\Tcpip\..\{C092A0D0-3668-47FF-9FB0-6E9D5C122E03}: NameServer = 85.255.115.70,85.255.112.138
backup-20061017-191510-958
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.70 85.255.112.138
backup-20060309-181845-684
O16 - DPF: {288C5F13-7E52-4ADA-A32E-F5BF9D125F99} - http://www.miniclip....pGameLoader.dll
backup-20060309-181845-766
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://web.qaizrwljo...Comu7Br5vX.html

Contents of the 'Scheduled Tasks' folder
C:\WINDOWS\tasks\{A65243CE-3BBF-4197-9A3E-C86B836A6435}_JULIE_Julie Mercier.job

Completion time: 06-10-18 17:24:28.03
C:\ComboFix.txt ... 06-10-18 17:24


*** BitDefender (Copy/Paste of HTML log) ***

BitDefender Online Scanner



Scan report generated at: Wed, Oct 18, 2006 - 18:39:17





Scan path: A:\;C:\;D:\;E:\;F:\;G:\;







Statistics

Time
00:54:12

Files
466108

Folders
3659

Boot Sectors
2

Archives
1883

Packed Files
64339




Results

Identified Viruses
12

Infected Files
51

Suspect Files
0

Warnings
0

Disinfected
0

Deleted Files
58




Engines Info

Virus Definitions
477333

Engine build
AVCORE v1.0 (build 2310) (i386) (Apr 17 2006 16:24:38)

Scan plugins
13

Archive plugins
38

Unpack plugins
6

E-mail plugins
6

System plugins
1




Scan Settings

First Action
Disinfect

Second Action
Delete

Heuristics
Yes

Enable Warnings
Yes

Scanned Extensions
*;

Exclude Extensions


Scan Emails
Yes

Scan Archives
Yes

Scan Packed
Yes

Scan Files
Yes

Scan Boot
Yes




Scanned File
Status

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043051.exe.bac_a01544=>(Quarantine-4)
Infected with: Trojan.Bettinet.A

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043051.exe.bac_a01544=>(Quarantine-4)
Disinfection failed

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043051.exe.bac_a01544=>(Quarantine-4)
Deleted

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043050.exe.bac_a01544=>(Quarantine-4)
Infected with: MemScan:Adware.Sahagent.A

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043050.exe.bac_a01544=>(Quarantine-4)
Disinfection failed

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043050.exe.bac_a01544=>(Quarantine-4)
Deleted

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043052.exe.bac_a01544=>(Quarantine-4)
Infected with: Dropped:Application.ProcKill.Jk

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043052.exe.bac_a01544=>(Quarantine-4)
Disinfection failed

C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043052.exe.bac_a01544=>(Quarantine-4)
Deleted

C:\Documents and Settings\PatMan\.housecall\Quarantine\jumpref.exe.bac_a01544=>(Quarantine-4)
Infected with: GenPack:Trojan.Downloader.Swizzor.BO

C:\Documents and Settings\PatMan\.housecall\Quarantine\jumpref.exe.bac_a01544=>(Quarantine-4)
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Infected with: Java.Trojan.Exploit.Bytverify.C

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Infected with: Java.Trojan.Exploit.Bytverify.C

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568
Update failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Infected with: Java.Trojan.Exploit.Bytverify.C

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Infected with: Java.Trojan.Exploit.Bytverify.C

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568
Update failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Infected with: Java.Trojan.Exploit.Bytverify.C

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Infected with: Java.Trojan.Exploit.Bytverify.C

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Beyond.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568
Update failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004830.dll.bac_a01568=>(Quarantine-4)
Infected with: DeepScan:Generic.Zlob.B61A6043

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004830.dll.bac_a01568=>(Quarantine-4)
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004830.dll.bac_a01568=>(Quarantine-4)
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Infected with: Trojan.Java.Classloader.Dummy.A

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Infected with: Java.Trojan.OpenConnection.F

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568
Update failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Infected with: Trojan.Java.Classloader.Dummy.A

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Infected with: Java.Trojan.OpenConnection.F

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568
Update failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Infected with: Java.Trojan.Exploit.Bytverify

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Infected with: Trojan.Java.Classloader.Dummy.A

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Dummy.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Infected with: Java.Trojan.OpenConnection.F

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Installer.class
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)
Updated

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568
Update failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004831.dll.bac_a01568=>(Quarantine-4)
Infected with: Trojan.Bravesentry.H

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004831.dll.bac_a01568=>(Quarantine-4)
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004831.dll.bac_a01568=>(Quarantine-4)
Deleted

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004838.exe.bac_a01568=>(Quarantine-4)
Infected with: Trojan.Fakealert.DK

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004838.exe.bac_a01568=>(Quarantine-4)
Disinfection failed

C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004838.exe.bac_a01568=>(Quarantine-4)
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012493.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012493.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012493.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012501.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012501.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012501.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012558.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012558.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012558.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012562.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012562.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012562.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012628.EXE
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012628.EXE
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012628.EXE
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012646.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012646.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012646.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012663.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012663.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012663.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012686.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012686.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012686.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012701.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012701.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012701.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012741.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012741.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012741.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012748.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012748.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012748.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012765.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012765.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012765.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012779.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012779.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012779.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012787.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012787.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012787.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012795.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012795.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012795.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012798.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012798.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012798.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012802.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012802.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012802.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012811.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012811.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012811.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012827.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012827.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012827.exe
Deleted

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP79\A0012876.exe
Infected with: MemScan:Trojan.Downloader.Mohbpork.A

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP79\A0012876.exe
Disinfection failed

C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP79\A0012876.exe
Deleted



*** BitDefender (TXT log) ***

<HTML>
<HEAD>
<TITLE>BitDefender Online Scanner -Scan Report</TITLE>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<meta name="generator" content="Namo WebEditor v5.0(Trial)">
</HEAD>
<BODY BGCOLOR=#FFFFFF leftmargin="10" marginwidth="0" topmargin="20" marginheight="0" >


<table align="center" border="0" cellpadding="0" cellspacing="0" width="90%">
<tr>
<td width="458">
<p><font face="Arial" color=red><span style="font-size:14pt;"><b>BitDefender
Online Scanner</b></span></font></p>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>
<tr>
<td colspan="3" width="912">
<p><font face="Arial"><span style="font-size:11pt;"><B>Scan report generated
at: Wed, Oct 18, 2006 - 18:39:17</b></span></font></p>
</td>
</tr>

<tr>
<td width="458">
<p><font face="Arial"><span style="font-size:11pt;"><B> </b></span></font></p>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>

<tr>
<td width="458">
<p><font face="Arial"><span style="font-size:11pt;"><B>Scan
path: </b></span><span style="font-size:10pt;">A:\;C:\;D:\;E:\;F:\;G:\;</span></font></p>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>

<tr>
<td width="458">
<p><font face="Arial"><span style="font-size:11pt;"><B> </b></span></font></p>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>

<tr>
<td width="458">
<table border="1" cellspacing="0" bordercolordark="white" bordercolorlight="black" width="100%">
<tr>
<td width="451" colspan="2" bgcolor="#CCCCCC">
<p><font face="Arial" size="2"><B>Statistics</b></font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Time</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">00:54:12</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Files</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">466108</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Folders</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">3659</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Boot Sectors</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">2</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Archives</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">1883</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Packed Files</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">64339</font></p>
</td>
</tr>
</table>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>



<tr>
<td width="458">
<table border="1" cellspacing="0" bordercolordark="white" bordercolorlight="black" width="100%">
<tr>
<td width="451" colspan="2" bgcolor="#CCCCCC">
<p><font face="Arial" size="2"><B>Results</b></font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Identified Viruses </font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">12</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Infected Files </font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">51</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Suspect Files </font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">0</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Warnings</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">0</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Disinfected</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">0</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Deleted Files</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">58</font></p>
</td>
</tr>
</table>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>

<tr>
<td width="458">
<table border="1" cellspacing="0" bordercolordark="white" bordercolorlight="black" width="100%">
<tr>
<td width="451" colspan="2" bgcolor="#CCCCCC">
<p><font face="Arial" size="2"><B>Engines Info</b></font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Virus Definitions</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">477333</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Engine build</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">AVCORE v1.0 (build 2310) (i386) (Apr 17 2006 16:24:38)</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Scan plugins</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">13</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Archive plugins</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">38</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Unpack plugins</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">6</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">E-mail plugins</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">6</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">System plugins</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">1</font></p>
</td>
</tr>
</table>
</td>
<td width="40%">
<p> </p>
</td>
<td width="10%">
<p> </p>
</td>
</tr>

<tr>
<td width="458">
<table border="1" cellspacing="0" bordercolordark="white" bordercolorlight="black" width="100%">
<tr>
<td width="451" colspan="2" bgcolor="#CCCCCC">
<p><font face="Arial" size="2"><B>Scan Settings</b></font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">First Action</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Disinfect</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Second Action</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Delete</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Heuristics</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Enable Warnings</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr><
  • 0

#13
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
...Continued of BitDefender TXT log (it seems I sent partial log, sorry)...


<tr>
<td width="57%">
<p><font face="Arial" size="2">Scanned Extensions</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">*;</font></p>
</td>
</tr>

<tr>
<td width="57%">
<p><font face="Arial" size="2">Exclude Extensions</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">&nbsp;</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Scan Emails</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Scan Archives</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Scan Packed</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Scan Files</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">Scan Boot</font></p>
</td>
<td width="43%" align="right">
<p><font face="Arial" size="2">Yes</font></p>
</td>
</tr>
</table>
</td>
<td width="40%">
<p>&nbsp;</p>
</td>
<td width="10%">
<p>&nbsp;</p>
</td>
</tr>

<tr>
<td colspan=2> &nbsp;
<table border="1" cellspacing="0" bordercolordark="white" bordercolorlight="black" width="100%">
<tr>
<td width="252" bgcolor="#CCCCCC">
<p><font face="Arial" size="2"><B>Scanned File</b></font></p>
</td>
<td width="195" bgcolor="#CCCCCC" align="right">
<p align="left"><b><font size="2" face="Arial">&nbsp;Status</font></b></p>
</td>
</tr>
<tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043051.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Trojan.Bettinet.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043051.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043051.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043050.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Adware.Sahagent.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043050.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043050.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043052.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Dropped:Application.ProcKill.Jk</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043052.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\A0043052.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\jumpref.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: GenPack:Trojan.Downloader.Swizzor.BO</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall\Quarantine\jumpref.exe.bac_a01544=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify.C</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify.C</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-2f4b9d59-5533358d.zip.bac_a01568</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Update failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify.C</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify.C</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbc813a-55f18d29.zip.bac_a01568</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Update failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>BlackBox.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify.C</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>VerifierBug.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify.C</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)=>Beyond.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\count.jar-5bbe7650-4e45186a.zip.bac_a01568</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Update failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004830.dll.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: DeepScan:Generic.Zlob.B61A6043</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004830.dll.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004830.dll.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Trojan.Java.Classloader.Dummy.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.OpenConnection.F</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-24128b06-216d628b.zip.bac_a01568</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Update failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Trojan.Java.Classloader.Dummy.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.OpenConnection.F</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-2414801c-38f82ad0.zip.bac_a01568</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Update failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>GetAccess.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.Exploit.Bytverify</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>InsecureClassLoader.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Trojan.Java.Classloader.Dummy.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Dummy.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Java.Trojan.OpenConnection.F</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)=>Installer.class</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%&quo
  • 0

#14
Pjeanmart

Pjeanmart

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
I think it is too long... (but I'm pretty sure I checked the "post Length" though...) Ok, anyway , it should be the last part...

Continued, of continued BitDefender TXT log :

</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Updated</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\classload.jar-77a1a725-7165a1bc.zip.bac_a01568</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Update failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004831.dll.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Trojan.Bravesentry.H</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004831.dll.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004831.dll.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004838.exe.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: Trojan.Fakealert.DK</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004838.exe.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\Documents and Settings\PatMan\.housecall6.6\Quarantine\A0004838.exe.bac_a01568=>(Quarantine-4)</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012493.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012493.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012493.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012501.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012501.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012501.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012558.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012558.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012558.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012562.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012562.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP74\A0012562.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012628.EXE</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012628.EXE</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012628.EXE</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012646.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012646.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012646.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012663.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012663.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012663.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012686.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012686.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP76\A0012686.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012701.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012701.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012701.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012741.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012741.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012741.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012748.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012748.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP77\A0012748.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012765.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012765.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012765.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012779.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012779.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012779.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012787.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012787.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012787.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012795.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012795.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012795.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012798.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012798.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012798.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012802.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012802.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012802.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012811.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012811.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012811.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012827.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012827.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP78\A0012827.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP79\A0012876.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Infected with: MemScan:Trojan.Downloader.Mohbpork.A</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP79\A0012876.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Disinfection failed</font></p>
</td>
</tr><tr>
<td width="57%">
<p><font face="Arial" size="2">C:\System Volume Information\_restore{55EFE802-7B5F-4EDE-8BF2-8160236B76AC}\RP79\A0012876.exe</font></p>
</td>
<td width="43%" align="left">
<p><font face="Arial" size="2">Deleted</font></p>
</td>
</tr>
</table>
</td>

<td width="10%">
<p>&nbsp;</p>
</td>
</tr>

<tr>
<td width="458">
<p><font face="Arial"><span style="font-size:11pt;"><B>&nbsp;</b></span></font></p>
</td>
<td width="40%">
<p>&nbsp;</p>
</td>
<td width="10%">
<p>&nbsp;</p>
</td>
</tr>

<tr>
<td width="458">
<p><font face="Arial"><span style="font-size:11pt;"><B>&nbsp;</b></span></font></p>
</td>
<td width="40%">
<p>&nbsp;</p>
</td>
<td width="10%">
<p>&nbsp;</p>
</td>
</tr>

</table>
<p>&nbsp;</p>

</body>
</html>



And finally...
*** HijackThis log ***

Logfile of HijackThis v1.99.1
Scan saved at 19:03, on 06-10-18
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\WgaTray.exe
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Hijack\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://sympatico.msn.ca/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.exe -off
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2\bin\npjpi142.dll
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/...UI.cab46479.cab
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/...dy.cab32846.cab
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/...at.cab32846.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitd...can8/oscan8.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {9D190AE6-C81E-4039-8061-978EBAD10073} (F-Secure Online Scanner 3.0) - http://support.f-sec.../ols3/fscax.cab
O16 - DPF: {B1826A9F-4AA0-4510-BA77-9013E74E4B9B} - http://www.trendmicr...scan/as4web.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn...ro.cab34246.cab
O16 - DPF: {CAC181B0-4D70-402D-B571-C596A47D0CE0} (CBankshotZoneCtrl Class) - http://zone.msn.com/...ol.cab42858.cab
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/...xy.cab41227.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe


Best Regards,

Patrick
  • 0

#15
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
If you will,upload the 2 files listed below to this Upload Site

C:\WINDOWS\system32\wtug.dll

C:\WINDOWS\system32\dmnmd.exe


After uploading,delete both please.


Open Internet Explorer,
Select Tools,
Select Internet Options
Select Delete Cookies and Delete Files(Check the box for Delete all offline content)

Go to Start,
Select All Programs
Select Accessories
Select System Tools
Select and Run Disk Cleanup(Make sure that all boxes are checked for cleaning)


If you use Mozilla Firefox--> Open Firefox and Click Tools --> Options--> Privacy

Click Clear for everything listed except Saved Passwords.


Please go HERE to run Panda's ActiveScan
  • Once you are on the Panda site click the Scan your PC button
  • A new window will open...click the Check Now button
  • Enter your Country
  • Enter your State/Province
  • Enter your e-mail address and click send
  • Select either Home User or Company
  • Click the big Scan Now button
  • If it wants to install an ActiveX component allow it
  • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
  • When download is complete, click on My Computer to start the scan
  • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.
  • Post the contents of the ActiveScan report

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP