Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Trojan Problem


  • Please log in to reply

#1
Tj N

Tj N

    New Member

  • Member
  • Pip
  • 7 posts
Hi, i run ESET Smart Security Business edition and a couple of days ago ESET picked up on several trojans attacking my computer.
They have been put in quarantine, but every now and again a certain trojan continues to attack my computer.
Here are the detection logs

3/02/2008 6:52:43 PM HTTP filter file http://void.theoreon.com/exe.php?ex=1039\ a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\Program Files\Mozilla Firefox\firefox.exe.
3/02/2008 5:21:44 PM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 5:21:43 PM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:40 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:38 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:35 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:33 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:31 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:28 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:26 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:24 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:22 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:20 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:17 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:15 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:13 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:11 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:14 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:12 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:09 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:07 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:04 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:02 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:59 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:53 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:51 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:48 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:42 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:39 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:36 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:27 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:30 PM Real-time file system protection file C:\Documents and Settings\n\Local Settings\Temporary Internet Files\Content.IE5\JVAAT8SG\test[1].htm JS/TrojanDownloader.Psyme.NBZ trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:17 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:14 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:14 PM HTTP filter file http://search-biz.org/2.ani a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:11:14 PM Real-time file system protection file C:\Documents and Settings\n\Local Settings\Temporary Internet Files\Content.IE5\KF2VZRUL\test[1].htm JS/TrojanDownloader.Psyme.NBZ trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:10:56 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:10:53 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:10:52 PM HTTP filter file http://search-biz.org/2.ani a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:51 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:49 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:47 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:45 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:42 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:40 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:38 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:35 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:33 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:30 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:28 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:26 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:23 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:21 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:22 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:17 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:13 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:09 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:02 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:58 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:54 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:50 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:46 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:40 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:36 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:33 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:27 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:27 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
31/01/2008 3:00:02 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
31/01/2008 3:00:01 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
30/01/2008 9:39:00 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
30/01/2008 9:38:59 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.








Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:57:07 PM, on 3/02/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\pctspk.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9BP.EXE
C:\WINDOWS\VM_STI.EXE
C:\Program Files\ESET\ESET Smart Security\egui.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\regsvr32.exe
C:\Program Files\Cyberlink\Shared Files\brs.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://ninemsn.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.optusnet.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost;*.local
O2 - BHO: (no name) - {008DB894-99ED-445D-8547-0E7C9808898D} - (no file)
O2 - BHO: My Search BHO - {014DA6C1-189F-421a-88CD-07CFE51CFF10} - C:\Program Files\MySearch\bar\2.bin\S4BAR.DLL
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: mwsBar BHO - {07B18EA1-A523-4961-B6BB-170DE4475CCA} - C:\Program Files\MyWebSearch\bar\1.bin\MWSBAR.DLL
O2 - BHO: (no name) - {69DC3D1D-B53F-B8C4-64A2-30C693F0A341} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: (no name) - {ab30153a-1dd1-11b2-830c-99986cc0bd35} - C:\WINDOWS\vojwlgxu.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: My &Web Search - {07B18EA9-A523-4961-B6BB-170DE4475CCA} - C:\Program Files\MyWebSearch\bar\1.bin\MWSBAR.DLL
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: My Search Bar - {014DA6C9-189F-421a-88CD-07CFE51CFF10} - C:\Program Files\MySearch\bar\2.bin\S4BAR.DLL
O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [sixth bits help hold] C:\Documents and Settings\All Users\Application Data\AmenDrvSixthBits\Amen noun.exe
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [MyWebSearch Email Plugin] C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwsoemon.exe
O4 - HKLM\..\Run: [EPSON Stylus CX3500 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9BP.EXE /P26 "EPSON Stylus CX3500 Series" /O6 "USB001" /M "Stylus CX3500"
O4 - HKLM\..\Run: [BigDogPath] C:\WINDOWS\VM_STI.EXE Vimicro USB PC Camera (ZC0301PL)
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Documents and Settings\n\My Documents\Nokia PC Suite 6\LaunchApplication.exe -startup
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [zkluhqzm] rundll32.exe "C:\Program Files\zkluhqzm\bsfghela.dll",Init
O4 - HKLM\..\Run: [vizqraba] regsvr32 /u "C:\Documents and Settings\All Users\Application Data\vizqraba.dll"
O4 - HKLM\..\Run: [BDRegion] C:\Program Files\Cyberlink\Shared Files\brs.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD\Language\Language.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Nokia.PCSync] C:\Documents and Settings\n\My Documents\Nokia PC Suite 6\PcSync2.exe /NoDialog (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Startup: MagicDisc.lnk = C:\Program Files\MagicDisc\MagicDisc.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O8 - Extra context menu item: Add to AMV Convert Tool... - C:\Program Files\MP3 Player Utilities 3.79\AMVConverter\grab.html
O8 - Extra context menu item: Add to Media Manager... - C:\Program Files\MP3 Player Utilities 3.79\MediaManager\grab.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Open in new background tab - res://C:\Program Files\Windows Live Toolbar\Components\en-au\msntabres.dll.mui/229?3850348f595640ab954ae634d3d0ae77
O8 - Extra context menu item: Open in new foreground tab - res://C:\Program Files\Windows Live Toolbar\Components\en-au\msntabres.dll.mui/230?3850348f595640ab954ae634d3d0ae77
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {2646205B-878C-11D1-B07C-0000C040BCDB} (NSIEMisc Class) - file://D:\HD\nskey.dll
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcaf...01/mcinsctl.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.mail.liv...es/MSNPUpld.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - http://download.mcaf...,26/mcgdmgr.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zon...nt.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.m...ash/swflash.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zon...er.cab56986.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PCTEL Speaker Phone (Pctspk) - Unknown owner - C:\WINDOWS\system32\pctspk.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\system32\ScsiAccess.EXE
O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
O24 - Desktop Component 0: (no name) - http://www.screensav...humbs/garf3.jpg
O24 - Desktop Component 2: (no name) - http://www.screensav...om/garfield.htm

--
End of file - 12665 bytes

Edited by Tj N, 03 February 2008 - 02:58 AM.

  • 0

Advertisements







Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP