They have been put in quarantine, but every now and again a certain trojan continues to attack my computer.
Here are the detection logs
3/02/2008 6:52:43 PM HTTP filter file http://void.theoreon.com/exe.php?ex=1039\ a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\Program Files\Mozilla Firefox\firefox.exe.
3/02/2008 5:21:44 PM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 5:21:43 PM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:40 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:38 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:35 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:33 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:31 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:28 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:26 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:24 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:22 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:20 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:17 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:15 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:13 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:37:11 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:14 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:12 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:09 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:07 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:04 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:18:02 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:59 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:53 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:51 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:48 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:42 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:39 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:36 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
3/02/2008 3:17:27 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:30 PM Real-time file system protection file C:\Documents and Settings\n\Local Settings\Temporary Internet Files\Content.IE5\JVAAT8SG\test[1].htm JS/TrojanDownloader.Psyme.NBZ trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:17 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:14 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
2/02/2008 8:23:14 PM HTTP filter file http://search-biz.org/2.ani a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:11:14 PM Real-time file system protection file C:\Documents and Settings\n\Local Settings\Temporary Internet Files\Content.IE5\KF2VZRUL\test[1].htm JS/TrojanDownloader.Psyme.NBZ trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:10:56 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:10:53 PM HTTP filter file http://2005-search.com/test/test.html JS/TrojanDownloader.Psyme.NBZ trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 10:10:52 PM HTTP filter file http://search-biz.org/2.ani a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:51 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:49 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:47 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:45 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:42 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:40 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:38 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:35 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:33 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:30 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:28 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:26 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:23 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 6:20:21 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:22 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:17 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:13 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:09 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:01:02 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:58 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:54 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:50 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:46 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:40 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:36 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:33 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:27 PM HTTP filter file http://void.theoreon...exe.php?ex=5071 a variant of Win32/Agent.ELD trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
1/02/2008 3:00:27 PM HTTP filter file http://void.theoreon..._id=5071&type=0 VBS/Exploit.Phel.CM trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
31/01/2008 3:00:02 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
31/01/2008 3:00:01 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
30/01/2008 9:39:00 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
30/01/2008 9:38:59 AM HTTP filter file http://hightstats.ne.../123/sploit.anr a variant of Win32/TrojanDownloader.Ani.Gen trojan connection terminated - quarantined NOORBERG-NA1NCP\n Threat was detected upon access to web by the application: C:\WINDOWS\WSEC32\clicli.exe.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:57:07 PM, on 3/02/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\pctspk.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9BP.EXE
C:\WINDOWS\VM_STI.EXE
C:\Program Files\ESET\ESET Smart Security\egui.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\regsvr32.exe
C:\Program Files\Cyberlink\Shared Files\brs.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://ninemsn.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.optusnet.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost;*.local
O2 - BHO: (no name) - {008DB894-99ED-445D-8547-0E7C9808898D} - (no file)
O2 - BHO: My Search BHO - {014DA6C1-189F-421a-88CD-07CFE51CFF10} - C:\Program Files\MySearch\bar\2.bin\S4BAR.DLL
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: mwsBar BHO - {07B18EA1-A523-4961-B6BB-170DE4475CCA} - C:\Program Files\MyWebSearch\bar\1.bin\MWSBAR.DLL
O2 - BHO: (no name) - {69DC3D1D-B53F-B8C4-64A2-30C693F0A341} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: (no name) - {ab30153a-1dd1-11b2-830c-99986cc0bd35} - C:\WINDOWS\vojwlgxu.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: My &Web Search - {07B18EA9-A523-4961-B6BB-170DE4475CCA} - C:\Program Files\MyWebSearch\bar\1.bin\MWSBAR.DLL
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: My Search Bar - {014DA6C9-189F-421a-88CD-07CFE51CFF10} - C:\Program Files\MySearch\bar\2.bin\S4BAR.DLL
O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [sixth bits help hold] C:\Documents and Settings\All Users\Application Data\AmenDrvSixthBits\Amen noun.exe
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [MyWebSearch Email Plugin] C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwsoemon.exe
O4 - HKLM\..\Run: [EPSON Stylus CX3500 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9BP.EXE /P26 "EPSON Stylus CX3500 Series" /O6 "USB001" /M "Stylus CX3500"
O4 - HKLM\..\Run: [BigDogPath] C:\WINDOWS\VM_STI.EXE Vimicro USB PC Camera (ZC0301PL)
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Documents and Settings\n\My Documents\Nokia PC Suite 6\LaunchApplication.exe -startup
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [zkluhqzm] rundll32.exe "C:\Program Files\zkluhqzm\bsfghela.dll",Init
O4 - HKLM\..\Run: [vizqraba] regsvr32 /u "C:\Documents and Settings\All Users\Application Data\vizqraba.dll"
O4 - HKLM\..\Run: [BDRegion] C:\Program Files\Cyberlink\Shared Files\brs.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD\Language\Language.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Nokia.PCSync] C:\Documents and Settings\n\My Documents\Nokia PC Suite 6\PcSync2.exe /NoDialog (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Startup: MagicDisc.lnk = C:\Program Files\MagicDisc\MagicDisc.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O8 - Extra context menu item: Add to AMV Convert Tool... - C:\Program Files\MP3 Player Utilities 3.79\AMVConverter\grab.html
O8 - Extra context menu item: Add to Media Manager... - C:\Program Files\MP3 Player Utilities 3.79\MediaManager\grab.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Open in new background tab - res://C:\Program Files\Windows Live Toolbar\Components\en-au\msntabres.dll.mui/229?3850348f595640ab954ae634d3d0ae77
O8 - Extra context menu item: Open in new foreground tab - res://C:\Program Files\Windows Live Toolbar\Components\en-au\msntabres.dll.mui/230?3850348f595640ab954ae634d3d0ae77
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {2646205B-878C-11D1-B07C-0000C040BCDB} (NSIEMisc Class) - file://D:\HD\nskey.dll
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcaf...01/mcinsctl.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.mail.liv...es/MSNPUpld.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - http://download.mcaf...,26/mcgdmgr.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zon...nt.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.m...ash/swflash.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zon...er.cab56986.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PCTEL Speaker Phone (Pctspk) - Unknown owner - C:\WINDOWS\system32\pctspk.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\system32\ScsiAccess.EXE
O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
O24 - Desktop Component 0: (no name) - http://www.screensav...humbs/garf3.jpg
O24 - Desktop Component 2: (no name) - http://www.screensav...om/garfield.htm
--
End of file - 12665 bytes
Edited by Tj N, 03 February 2008 - 02:58 AM.