Options

Virus removal help

i dont know whats the name of my virus but it pops up where my taskbar is the place where it shows the time. Its a yello triangle with a ! in the middle D:. It pops up and says i have a virus and tells me to click on the balloon. i dont click on it and click on the triangle thing and it disappears but it comes back after a few seconds. It also pops up some other virus alert stuff i dont know how to remove it anyone help?(Tell me if i discribed it enough or tell me if i need to show you my hijack log)

oh eya i forgot everytime i open my internet to my homepage it directs me to a virus removal website =\

Comments

  • edited November 2007
    Hi jinlord and welcome to Icrontic Spyware & Virus Removal
    • Download HJTInstall.exe to your Desktop.
    • Doubleclick HJTInstall.exe to install it.
    • By default it will install to C:\Program Files\Trend Micro\HijackThis .
    • Click on Install.
    • It will create a HijackThis icon on the desktop.
    • Once installed, it will launch Hijackthis.
    • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
    • Copy/Paste the log to your next reply please.
    Don't use the Analyse This button, its findings are dangerous if misinterpreted.
    Don't have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.
  • edited November 2007
    Hi peku006 thank you for replying to my thread its been son long D:.
    I did what u said and heres my log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 3:23:05 PM, on 14/11/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    C:\WINDOWS\mrofinu572.exe
    C:\Program Files\WinAble\winable.exe
    C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\Tmljaw\command.exe
    C:\WINDOWS\system32\elkjfirl.exe
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Network Monitor\netmon.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Security Toolbar - {11A69AE4-FBED-4832-A2BF-45AF82825583} - C:\WINDOWS\system32\nsbhujkm.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    O4 - HKLM\..\Run: [runner1] C:\WINDOWS\mrofinu572.exe 61A847B5BBF728173599284503996897C881250221C8670836AC4FA7C8833201749139
    O4 - HKLM\..\Run: [50da98e0] rundll32.exe "C:\WINDOWS\system32\qaritael.dll",b
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [WinAble] C:\Program Files\WinAble\winable.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.2.100.cab
    O16 - DPF: {5F5F9FB8-878E-4455-95E0-F64B2314288A} (ijjiPlugin2 Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin11USA.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} (HGPlugin9USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
    O16 - DPF: {DD583921-A9E9-4FBF-9266-8DC2AB5EA0AF} (HGPlugin10USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin10USA.cab
    O20 - AppInit_DLLs: hadjajr.ini
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\Tmljaw\command.exe
    O23 - Service: DomainService - - C:\WINDOWS\system32\elkjfirl.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    --
    End of file - 5761 bytes
  • edited November 2007
    Hi jinlord

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm

    Please post the content of that report in your next reply.

    Please download SDFix by AndyManchesta and save it to your desktop.

    Double-click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix).

    Please then reboot your computer into Safe Mode by doing the following:
    • Restart your computer.
    • After hearing your computer beep once during startup, but just before the Windows icon appears, tap the F8 key continually.
    • Instead of Windows loading as normal, a menu with options should appear.
    • Select the first option, to run Windows in "Safe Mode", then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, please do the following:
    • Open the extracted folder and double-click RunThis.bat to start the script.
    • Type "Y" to begin the cleanup process.
    • It will remove any Trojan Services or Registry Entries found, then prompt you to press any key to Reboot.
    • Press any Key and it will restart the PC.
    • When the PC restarts the Fixtool will run again and complete the removal process, then display "Finished", press any key to end the script and load your desktop icons.
    • Once the desktop icons load, the SDFix report will open on screen and also save into the SDFix folder as Report.txt
      (Report.txt will also be copied to Clipboard ready for posting back on the forum).



    Please download the ComboFix by sUBs:

    NOTE: In the event you already have ComboFix, this is a new version that you have to download.
    • Save it to your desktop.
    • Double-click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Copy and paste the contents of the log in your next reply.
    Please do NOT mouse-click ComboFix's window while it is running. That may cause it to stall.

    After you have completed the above, please provide:
    Report.txt
    SmitfraudFix.
    [SIZE=-1]report [/SIZE]
    Combofix.txt
    new HijackThis log
  • edited November 2007
    Hi again here is my SmitFraud log:

    SmitFraudFix v2.253
    Scan done at 15:40:33.21, 15/11/2007
    Run from C:\Documents and Settings\Nick\Desktop\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode
    »»»»»»»»»»»»»»»»»»»»»»»» Process
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\Tmljaw\command.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    C:\WINDOWS\mrofinu572.exe
    C:\Program Files\WinAble\winable.exe
    C:\WINDOWS\system32\elkjfirl.exe
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Network Monitor\netmon.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\cmd.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    »»»»»»»»»»»»»»»»»»»»»»»» hosts

    »»»»»»»»»»»»»»»»»»»»»»»» C:\

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS
    C:\WINDOWS\Tasks\At?.job FOUND !
    C:\WINDOWS\Tasks\At??.job FOUND !
    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32
    C:\WINDOWS\system32\vtr???.dll FOUND !
    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles

    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Nick

    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Nick\Application Data
    C:\Documents and Settings\Nick\Application Data\Install.dat FOUND !
    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu

    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Nick\FAVORI~1

    »»»»»»»»»»»»»»»»»»»»»»»» Desktop

    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys

    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"

    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!
    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"="hadjajr.ini"

    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""

    »»»»»»»»»»»»»»»»»»»»»»»» Rustock

    »»»»»»»»»»»»»»»»»»»»»»»» DNS
    Description: D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2) #2 - Packet Scheduler Miniport
    DNS Server Search Order: 192.168.0.1
    Description: D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2) #2 - Packet Scheduler Miniport
    DNS Server Search Order: 192.168.0.1
    Description: D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2) #2 - Packet Scheduler Miniport
    DNS Server Search Order: 192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{911AD1F8-2BE7-4817-86D2-B667F0C87355}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{E9788ECE-4A5A-4C2A-825D-9A6D8F63D892}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{610B1665-BD37-4571-9E01-D685CF55FD23}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{911AD1F8-2BE7-4817-86D2-B667F0C87355}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{E9788ECE-4A5A-4C2A-825D-9A6D8F63D892}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{911AD1F8-2BE7-4817-86D2-B667F0C87355}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{E9788ECE-4A5A-4C2A-825D-9A6D8F63D892}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1

    »»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection

    »»»»»»»»»»»»»»»»»»»»»»»» End

    now im gonna do the next step please wait D:
  • edited November 2007
    here is the SDFix log:

    SDFix: Version 1.114
    Run by Nick on 15/11/2007 at 03:49 PM
    Microsoft Windows XP [Version 5.1.2600]
    Running From: C:\DOCUME~1\Nick\Desktop\Maple\SDFix
    Safe Mode:
    Checking Services:
    Name:
    cmdService
    Network Monitor
    Path:
    C:\WINDOWS\Tmljaw\command.exe
    C:\Program Files\Network Monitor\netmon.exe service
    cmdService - Deleted
    Network Monitor - Deleted

    Restoring Windows Registry Values
    Restoring Windows Default Hosts File
    Rebooting...

    Normal Mode:
    Checking Files:
    Trojan Files Found:
    C:\WINDOWS\Tmljaw\asappsrv.dll - Deleted
    C:\WINDOWS\Tmljaw\command.exe - Deleted
    C:\WINDOWS\Tmljaw\nA53uT.vbs - Deleted
    C:\WINDOWS\system32\m2\rarndrll2.exe - Deleted
    C:\WINDOWS\system32\o1\wr31drs.exe - Deleted
    C:\WINDOWS\system32\v4\caws83122.exe - Deleted
    C:\Program Files\WinAble\winable.exe - Deleted
    C:\Program Files\Network Monitor\netmon.exe - Deleted
    C:\Documents and Settings\Nick\Application Data\Install.dat - Deleted
    C:\DOCUME~1\Nick\LOCALS~1\Temp\cmdinst.exe - Deleted
    C:\DOCUME~1\Nick\LOCALS~1\Temp\removalfile.bat - Deleted
    C:\WINDOWS\b104.exe - Deleted
    C:\WINDOWS\b122.exe - Deleted
    C:\WINDOWS\b128.exe - Deleted
    C:\WINDOWS\b138.exe - Deleted
    C:\WINDOWS\b147.exe - Deleted
    C:\WINDOWS\mrofinu1000106.exe - Deleted
    C:\WINDOWS\mrofinu572.exe - Deleted
    C:\WINDOWS\system32\atmtd.dll - Deleted
    C:\WINDOWS\system32\atmtd.dll._ - Deleted
    C:\WINDOWS\system32\vtr.dll - Deleted
    C:\WINDOWS\uninstall_nmon.vbs - Deleted

    Folder C:\Program Files\Network Monitor - Removed
    Folder C:\Program Files\Temporary - Removed
    Folder C:\Program Files\WinAble - Removed
    Folder C:\Temp\1cb - Removed
    Folder C:\WINDOWS\system32\m2 - Removed
    Folder C:\WINDOWS\system32\o1 - Removed
    Folder C:\WINDOWS\system32\v4 - Removed
    Removing Temp Files...
    ADS Check:
    C:\WINDOWS
    No streams found.
    C:\WINDOWS\system32
    No streams found.
    C:\WINDOWS\system32\svchost.exe
    No streams found.

    C:\WINDOWS\system32\ntoskrnl.exe
    No streams found.


    Final Check:
    catchme 0.3.1262.1 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-15 16:08:01
    Windows 5.1.2600 Service Pack 2 NTFS
    scanning hidden processes ...
    scanning hidden services & system hive ...
    scanning hidden registry entries ...
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{71D1B179-60CC-24A1-F3C4-59F353586380}]
    scanning hidden files ...
    C:\Documents and Settings\Nick\Local Settings\Application Data\Microsoft\Messenger\m4pl3fr33k@hotmail.com\SharingMetadata\lazydude3@hotmail.com\DFSR\Staging\CS{A1725DA5-7CEE-146E-4793-13F553E2AB58}\01\10-{A1725DA5-7CEE-146E-4793-13F553E2AB58}-v1-{32929220-CE4F-4EFB-80DF-7101E1653E58}-v10-Downloaded.frx:{59828bbb-3f72-4c1b-a420-b51ad66eb5d3}.XPRESS 8 bytes hidden from API
    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 1

    Remaining Services:

    Authorized Application Key Export:
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
    "C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
    "C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
    "C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"
    "C:\\Program Files\\LegacyGamers\\GunZ Online\\GunZLauncher.exe"="C:\\Program Files\\LegacyGamers\\GunZ Online\\GunZLauncher.exe:*:Disabled:Gunz"
    "C:\\Program Files\\Symantec\\LiveUpdate\\LuComServer.EXE"="C:\\Program Files\\Symantec\\LiveUpdate\\LuComServer.EXE:*:Enabled:LiveUpdate Engine COM Module"
    "C:\\Program Files\\LegacyGamers International Gaming Community\\LegacyGamers GunZ Online\\Gunz.exe"="C:\\Program Files\\LegacyGamers International Gaming Community\\LegacyGamers GunZ Online\\Gunz.exe:*:Enabled:Gunz"
    "C:\\Nexon\\MapleStory\\MapleStory.exe"="C:\\Nexon\\MapleStory\\MapleStory.exe:*:Enabled:MapleStory"
    "C:\\Nexon\\MapleStory\\Patcher.exe"="C:\\Nexon\\MapleStory\\Patcher.exe:*:Enabled:Patcher MFC ?? ????"
    "C:\\Nexon\\MapleStory\\NewPatcher.exe"="C:\\Nexon\\MapleStory\\NewPatcher.exe:*:Enabled:Patcher MFC ?? ????"
    "C:\\Program Files\\LegacyGamers\\LegacyGamers GunZ Online\\Gunz.exe"="C:\\Program Files\\LegacyGamers\\LegacyGamers GunZ Online\\Gunz.exe:*:Enabled:Gunz"
    "C:\\Program Files\\LegacyGamers\\LegacyGamers GunZ Online\\LegacyGamers.exe"="C:\\Program Files\\LegacyGamers\\LegacyGamers GunZ Online\\LegacyGamers.exe:*:Disabled:Gunz"
    "C:\\Program Files\\GameFlier\\GhostOnline\\game.exe"="C:\\Program Files\\GameFlier\\GhostOnline\\game.exe:*:Enabled:game"
    "C:\\Documents and Settings\\All Users\\Application Data\\NexonUS\\NGM\\NGM.exe"="C:\\Documents and Settings\\All Users\\Application Data\\NexonUS\\NGM\\NGM.exe:*:Enabled:Nexon Game Manager"
    "C:\\Nexon\\KartRider\\NMService.exe"="C:\\Nexon\\KartRider\\NMService.exe:*:Enabled:Nexon Messenger Core"
    "C:\\Program Files\\mIRC\\mirc.exe"="C:\\Program Files\\mIRC\\mirc.exe:*:Enabled:mIRC"
    "C:\\Program Files\\Bonjour\\mDNSResponder.exe"="C:\\Program Files\\Bonjour\\mDNSResponder.exe:*:Enabled:Bonjour"
    "C:\\WINDOWS\\system32\\elkjfirl.exe"="C:\\WINDOWS\\system32\\elk"
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
    "C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
    "C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"
    Remaining Files:
    File Backups: - C:\DOCUME~1\Nick\Desktop\Maple\SDFix\backups\backups.zip
    Files with Hidden Attributes:
    Mon 5 Nov 2007 286,899 ..SH. --- "C:\WINDOWS\system32\jlkkj.tmp"
    Mon 29 Oct 2007 6,470 ..SH. --- "C:\WINDOWS\system32\jlkkj.bak1"
    Thu 15 Nov 2007 291,398 ..SH. --- "C:\WINDOWS\system32\jlkkj.bak2"
    Thu 15 Nov 2007 20,768 ..SH. --- "C:\WINDOWS\system32\nsbhujkm.dllbox"
    Sun 10 Jun 2007 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico1.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico2.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico3.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico4.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico5.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico8.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\ico9.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\icoA.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\icoB.tmp"
    Thu 15 Nov 2007 4,286 A..H. --- "C:\Documents and Settings\Nick\Local Settings\Temp\icoC.tmp"
    Finished!
  • edited November 2007
    Well the ComboFix think had a problem at the end while making the log it said the "SED" file is not found or something but heres my HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 16:40, on 2007-11-15
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Security Toolbar - {11A69AE4-FBED-4832-A2BF-45AF82825583} - C:\WINDOWS\system32\nsbhujkm.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    O4 - HKLM\..\Run: [50da98e0] rundll32.exe "C:\WINDOWS\system32\ppsquikg.dll",b
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.2.100.cab
    O16 - DPF: {5F5F9FB8-878E-4455-95E0-F64B2314288A} (ijjiPlugin2 Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin11USA.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} (HGPlugin9USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
    O16 - DPF: {DD583921-A9E9-4FBF-9266-8DC2AB5EA0AF} (HGPlugin10USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin10USA.cab
    O20 - AppInit_DLLs: hadjajr.ini
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    --
    End of file - 4717 bytes

    oh btw the wierd yellow triangle thing is not gone still D:
  • edited November 2007
    Hi jinlord

    Please reboot to Safe Mode (tap the F8 key just before Windows starts to load and select the Safe Mode option from the menu).
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.exe:
    • Select Option #2 - Clean by typing 2 and press "Enter" to delete infected files.
    • You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.
    • The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".
    • The tool may need to restart your computer to finish the cleaning process. If it doesn't, please restart it into Normal Windows.
    • A text file will appear onscreen, with results from the cleaning process. Please copy/paste the content of that report into your next reply.
    WARNING: Running Option #2 on a non-infected computer will remove your Desktop background.




    Please download VundoFix.exe to your desktop.
    • Double-click VundoFix.exe to run it.
    • Click the Scan for Vundo button.
    • Once it's done scanning, click the Remove Vundo button.
    • You will receive a prompt asking if you want to remove the files, click YES
    • Once you click yes, your desktop will go blank as it starts removing Vundo.
    • When completed, it will prompt that it will reboot your computer, click OK.
    • Please post the contents of C:\vundofix.txt and a new HiJackThis log.
    Note: It is possible that VundoFix encountered a file it could not remove.
    In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.


    Delete combofix.exe from your desktop. Download & save a new copy to your desktop

    Download combofix from
    Link
    Double click combofix.exe & follow the prompts.
    When finished, it shall produce a log for you. Post that log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall


    After you have completed the above, please provide:
    SmitfraudFix.report
    C:\vundofix.txt
    C:\Combofix.txt
    new HijackThis log
  • edited November 2007
    Hi peku006 here is my new SmitFraud log:

    SmitFraudFix v2.253
    Scan done at 5:13:08.48, 2007-11-16
    Run from C:\Documents and Settings\Nick\Desktop\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode
    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!
    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll
    »»»»»»»»»»»»»»»»»»»»»»»» Killing process

    »»»»»»»»»»»»»»»»»»»»»»»» hosts
    127.0.0.1 localhost
    »»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
    S!Ri's WS2Fix: LSP not Found.

    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
    GenericRenosFix by S!Ri

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files
    C:\WINDOWS\Tasks\At?.job Deleted
    C:\WINDOWS\Tasks\At??.job Deleted
    »»»»»»»»»»»»»»»»»»»»»»»» DNS
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{911AD1F8-2BE7-4817-86D2-B667F0C87355}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{E9788ECE-4A5A-4C2A-825D-9A6D8F63D892}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{610B1665-BD37-4571-9E01-D685CF55FD23}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{911AD1F8-2BE7-4817-86D2-B667F0C87355}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{E9788ECE-4A5A-4C2A-825D-9A6D8F63D892}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{911AD1F8-2BE7-4817-86D2-B667F0C87355}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{E9788ECE-4A5A-4C2A-825D-9A6D8F63D892}: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files

    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""

    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    now please wait abit more i need to do the other steps
  • edited November 2007
    heres my VundoFix log:

    VundoFix V6.6.1
    Checking Java version...
    Sun Java not detected
    Scan started at 05:24:03 2007-11-16
    Listing files found while scanning....
    C:\windows\system32\gebbcde.dll
    C:\WINDOWS\system32\nsbhujkm.dll
    Beginning removal...
    Attempting to delete C:\windows\system32\gebbcde.dll
    C:\windows\system32\gebbcde.dll Could not be deleted.
    Attempting to delete C:\WINDOWS\system32\nsbhujkm.dll
    C:\WINDOWS\system32\nsbhujkm.dll Has been deleted!
    Performing Repairs to the registry.
    Done!
    Beginning removal...
    Attempting to delete C:\windows\system32\gebbcde.dll
    C:\windows\system32\gebbcde.dll Has been deleted!
    Performing Repairs to the registry.
    Done!

    now just the ComboFix and HJT log to go
  • edited November 2007
    Hello peku006 again the SED file was not found while running ComboFix but..there was a log for it here it is:

    ComboFix 07-11-08.1 - Nick 2007-11-16 6:08:03.5 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.241 [GMT -5:00]
    Running from: C:\Documents and Settings\Nick\Desktop\ComboFix.exe
    .
    Unable to gain System Privileges
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    C:\Documents and Settings\All Users\Start Menu\Live Safety Center.lnk
    C:\Documents and Settings\All Users\Start Menu\Online Security Guide.lnk
    C:\Documents and Settings\Nick\Favorites\Online Security Guide.lnk
    C:\WINDOWS\cookies.ini
    C:\WINDOWS\system32\ccbeg.bak1
    C:\WINDOWS\system32\ccbeg.bak2
    C:\WINDOWS\system32\ccbeg.ini
    C:\WINDOWS\system32\ccbeg.ini2
    C:\WINDOWS\system32\ccbeg.tmp
    C:\WINDOWS\system32\gebcc.dll
    C:\WINDOWS\system32\hnfqjntk.dllbox
    C:\WINDOWS\system32\nsbhujkm.dllbox
    .
    ---- Previous Run
    .
    C:\Documents and Settings\All Users\Application Data.\salesmonitor
    C:\Documents and Settings\All Users\Start Menu\Live Safety Center.lnk
    C:\Documents and Settings\All Users\Start Menu\Online Security Guide.lnk
    C:\Documents and Settings\LocalService\Application Data\NetMon
    C:\Documents and Settings\LocalService\Application Data\NetMon\domains.txt
    C:\Documents and Settings\LocalService\Application Data\NetMon\log.txt
    C:\Documents and Settings\NetworkService\Application Data\NetMon
    C:\Documents and Settings\NetworkService\Application Data\NetMon\domains.txt
    C:\Documents and Settings\NetworkService\Application Data\NetMon\log.txt
    C:\Documents and Settings\Nick\Application Data.\AVSystemCare
    C:\Documents and Settings\Nick\Application Data.\AVSystemCare\avtasks.dat
    C:\Documents and Settings\Nick\Application Data.\AVSystemCare\Logs\av.log
    C:\Documents and Settings\Nick\Application Data.\AVSystemCare\Logs\ga6Support.log
    C:\Documents and Settings\Nick\Application Data.\AVSystemCare\PGE.dat
    C:\Documents and Settings\Nick\Application Data\APPATC~1
    C:\Documents and Settings\Nick\Application Data\SCURIT~1
    C:\Documents and Settings\Nick\Desktop\Live Safety Center.lnk
    C:\Documents and Settings\Nick\Desktop\Online Security Guide.lnk
    C:\Documents and Settings\Nick\Favorites\Online Security Guide.lnk
    C:\UGA6P
    C:\WINDOWS\cookies.ini
    C:\WINDOWS\system32\elkjfirl.exe
    C:\WINDOWS\system32\jkklj.dll
    C:\WINDOWS\system32\jlkkj.bak1
    C:\WINDOWS\system32\jlkkj.bak2
    C:\WINDOWS\system32\jlkkj.ini
    C:\WINDOWS\system32\jlkkj.ini2
    C:\WINDOWS\system32\jlkkj.tmp
    C:\WINDOWS\system32\joydxlxr.exe
    C:\WINDOWS\system32\lmlxjqwl.dll
    C:\WINDOWS\system32\nggobphm.exe
    C:\WINDOWS\system32\nsbhujkm.dllbox
    C:\WINDOWS\system32\pac.txt
    C:\WINDOWS\system32\rqkngtob.exe
    C:\WINDOWS\system32\siljsuey.exe
    C:\WINDOWS\system32\sxaavsmu.exe
    C:\WINDOWS\system32\sysdl132.exe
    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    \LEGACY_DOMAINSERVICE
    \DomainService

    \LEGACY_DOMAINSERVICE
    \DomainService

    ((((((((((((((((((((((((( Files Created from 2007-10-16 to 2007-11-16 )))))))))))))))))))))))))))))))
    .
    2007-11-16 05:50 85,056 --a
    C:\WINDOWS\system32\devtyxry.dll
    2007-11-16 05:46 81,984 --a
    C:\WINDOWS\system32\fmgnhrmd.dll
    2007-11-16 05:42 144,480 --a
    C:\WINDOWS\system32\hnfqjntk.dll
    2007-11-16 05:41 144,480 --a
    C:\WINDOWS\system32\vbjyobmb.dll
    2007-11-16 05:41 71,232 --a
    C:\WINDOWS\system32\fpqrcbvx.exe
    2007-11-16 05:24 <DIR> d
    C:\VundoFix Backups
    2007-11-16 05:22 81,984 --a
    C:\WINDOWS\system32\dujfyjnx.dll
    2007-11-16 05:20 71,232 --a
    C:\WINDOWS\system32\tlyltfye.exe
    2007-11-16 03:23 81,984 --a
    C:\WINDOWS\system32\wufvkjxs.dll
    2007-11-16 03:20 85,056 --a
    C:\WINDOWS\system32\kfgtkndd.dll
    2007-11-16 03:14 71,232 --a
    C:\WINDOWS\system32\wilwvlhf.exe
    2007-11-15 16:16 51,200 --a
    C:\WINDOWS\NirCmd.exe
    2007-11-15 16:04 71,232 --a
    C:\WINDOWS\system32\acpbrdmw.exe
    2007-11-15 15:48 <DIR> d
    C:\WINDOWS\ERUNT
    2007-11-15 15:40 289,144 --a
    C:\WINDOWS\system32\VCCLSID.exe
    2007-11-15 15:40 25,600 --a
    C:\WINDOWS\system32\WS2Fix.exe
    2007-11-15 15:30 16,324 --a
    C:\WINDOWS\system32\instdump.zip
    2007-11-15 15:17 71,232 --a
    C:\WINDOWS\system32\gjbxnrti.exe
    2007-11-15 04:50 79,936 --a
    C:\WINDOWS\system32\cwbeecpn.dll
    2007-11-15 04:44 71,232 --a
    C:\WINDOWS\system32\vfabkhgm.exe
    2007-11-14 20:31 184,320 --a
    C:\WINDOWS\system32\aH8QuNgy.dll
    2007-11-14 20:13 71,232 --a
    C:\WINDOWS\system32\xtyxqcfj.exe
    2007-11-14 17:16 71,232 --a
    C:\WINDOWS\system32\rwakukog.exe
    2007-11-14 15:40 85,056 --a
    C:\WINDOWS\system32\eqmlgobv.dll
    2007-11-14 15:38 71,232 --a
    C:\WINDOWS\system32\ccqjklym.exe
    2007-11-14 15:22 <DIR> d
    C:\Program Files\Trend Micro
    2007-11-14 15:18 71,232 --a
    C:\WINDOWS\system32\ecnjivgm.exe
    2007-11-13 19:56 85,056 --a
    C:\WINDOWS\system32\nlmqmtky.dll
    2007-11-13 19:50 71,232 --a
    C:\WINDOWS\system32\wxkxutpj.exe
    2007-11-13 18:17 85,056 --a
    C:\WINDOWS\system32\ixtfpjqq.dll
    2007-11-13 18:13 71,232 --a
    C:\WINDOWS\system32\mmuoxhph.exe
    2007-11-13 15:17 71,232 --a
    C:\WINDOWS\system32\gotlvgdt.exe
    2007-11-12 20:15 184,320 --a
    C:\WINDOWS\system32\M16Lc7vs.dll
    2007-11-12 20:07 89,664 --a
    C:\WINDOWS\system32\kyxfhbpl.dll
    2007-11-12 20:04 71,232 --a
    C:\WINDOWS\system32\bxlvsyjo.exe
    2007-11-12 17:06 71,232 --a
    C:\WINDOWS\system32\wboqsqat.exe
    2007-11-12 12:41 71,232 --a
    C:\WINDOWS\system32\xhvratle.exe
    2007-11-12 12:11 <DIR> d
    C:\WINDOWS\system32\rMa01yy
    2007-11-12 12:10 <DIR> d
    C:\Temp\abW9
    2007-11-12 12:10 35,328 --a
    C:\WINDOWS\system32\mljklji.dll
    2007-11-12 12:06 144,480 --a
    C:\WINDOWS\system32\ikdmoaco.dll
    2007-11-12 12:00 71,232 --a
    C:\WINDOWS\system32\nrhjvoip.exe
    2007-11-12 10:23 71,232 --a
    C:\WINDOWS\system32\etfprvfo.exe
    2007-11-12 10:01 71,232 --a
    C:\WINDOWS\system32\pfvsnkaf.exe
    2007-11-12 09:35 71,232 --a
    C:\WINDOWS\system32\bndbbhds.exe
    2007-11-11 19:10 71,232 --a
    C:\WINDOWS\system32\bchdajyc.exe
    2007-11-11 18:03 71,232 --a
    C:\WINDOWS\system32\ihuehoxi.exe
    2007-11-11 17:30 88,128 --a
    C:\WINDOWS\system32\rvyrkbxk.dll
    2007-11-11 17:25 71,232 --a
    C:\WINDOWS\system32\wiyvrawi.exe
    2007-11-11 17:15 71,232 --a
    C:\WINDOWS\system32\kahfonla.exe
    2007-11-11 15:16 88,128 --a
    C:\WINDOWS\system32\lbebrimt.dll
    2007-11-11 15:14 71,232 --a
    C:\WINDOWS\system32\ntacqham.exe
    2007-11-11 14:06 71,232 --a
    C:\WINDOWS\system32\seulsrso.exe
    2007-11-11 10:46 71,232 --a
    C:\WINDOWS\system32\mhlfpyix.exe
    2007-11-10 17:30 184,320 --a
    C:\WINDOWS\system32\smtPbiTI.dll
    2007-11-10 17:20 71,232 --a
    C:\WINDOWS\system32\vhtrwtxd.exe
    2007-11-10 14:34 71,232 --a
    C:\WINDOWS\system32\pndwxtmt.exe
    2007-11-10 12:40 71,232 --a
    C:\WINDOWS\system32\bqcxefyd.exe
    2007-11-10 12:22 71,232 --a
    C:\WINDOWS\system32\yhqdxfgp.exe
    2007-11-10 12:14 <DIR> d-a
    C:\Documents and Settings\All Users\Application Data\TEMP
    2007-11-10 12:12 626,688 --a
    C:\WINDOWS\system32\msvcr80.dll
    2007-11-10 09:31 71,232 --a
    C:\WINDOWS\system32\vqcxvvmg.exe
    2007-11-09 15:18 71,232 --a
    C:\WINDOWS\system32\mcbrmyfh.exe
    2007-11-08 15:15 71,232 --a
    C:\WINDOWS\system32\ysjtolre.exe
    2007-11-07 20:40 35,328 --a
    C:\WINDOWS\system32\cbxwtrr.dll
    2007-11-07 20:36 35,328 --a
    C:\WINDOWS\system32\iifdecc.dll
    2007-11-07 20:27 71,232 --a
    C:\WINDOWS\system32\ylpgyare.exe
    2007-11-07 19:49 71,232 --a
    C:\WINDOWS\system32\swojaywi.exe
    2007-11-05 18:27 1,060,864 --a
    C:\WINDOWS\system32\mfc71.dll
    2007-11-05 18:27 348,160 --a
    C:\WINDOWS\system32\msvcr71.dll
    2007-11-05 18:27 89,088 --a
    C:\WINDOWS\system32\atl71.dll
    2007-11-05 18:27 24,064 --a
    C:\WINDOWS\system32\msxml3a.dll
    2007-11-05 17:11 36,352 --a
    C:\WINDOWS\system32\iiiiiii.dll
    2007-11-05 17:07 <DIR> d
    C:\WINDOWS\Tmljaw
    2007-11-05 17:07 <DIR> d
    C:\WINDOWS\system32\Mz02r
    2007-11-05 17:07 <DIR> d
    C:\Temp\mZOr
    2007-11-05 17:07 <DIR> d
    C:\Temp
    2007-11-05 17:07 36,352 --a
    C:\WINDOWS\system32\yayvvvt.dll
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-15 00:38
    d
    w C:\Documents and Settings\Nick\Application Data\mIRC
    2007-11-15 00:35
    d
    w C:\Program Files\mIRC
    2007-11-09 20:28 27,200 ----a-w C:\WINDOWS\system32\65f475kH.exe
    2007-10-19 12:57
    d--h--w C:\Program Files\InstallShield Installation Information
    2007-10-12 20:11
    d
    w C:\Documents and Settings\All Users\Application Data\FLEXnet
    2007-10-12 20:03
    d
    w C:\Program Files\Common Files\Adobe
    2007-10-12 20:03
    d
    w C:\Program Files\Bonjour
    2007-10-12 19:43
    d
    w C:\Program Files\Common Files\Macrovision Shared
    2007-10-04 19:42
    d
    w C:\Documents and Settings\All Users\Application Data\NexonUS
    .
    ((((((((((((((((((((((((((((( [EMAIL="snapshot@2007-11-15_16.36.49.40"]snapshot@2007-11-15_16.36.49.40[/EMAIL] )))))))))))))))))))))))))))))))))))))))))
    .
    - 2007-11-08 21:59:01 136,704 ----a-w C:\WINDOWS\catchme.exe
    + 2007-10-29 23:56:19 136,192 ----a-w C:\WINDOWS\catchme.exe
    - 2007-11-15 21:07:10 40,108 ----a-w C:\WINDOWS\system32\perfc009.dat
    + 2007-11-16 10:46:00 40,108 ----a-w C:\WINDOWS\system32\perfc009.dat
    - 2007-11-15 21:07:10 311,912 ----a-w C:\WINDOWS\system32\perfh009.dat
    + 2007-11-16 10:46:01 311,912 ----a-w C:\WINDOWS\system32\perfh009.dat
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{55F7CA4F-0E86-4BF5-8543-980DEE13AE31}]
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{85589B5D-D53D-4237-A677-46B82EA275F3}]
    2007-11-14 20:31 184320 --a
    C:\WINDOWS\system32\aH8QuNgy.dll
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{869a335d-ecc9-4ad8-8dd5-62d6e76d3037}]
    2007-11-16 05:46 81984 --a
    C:\WINDOWS\system32\fmgnhrmd.dll
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A95B2816-1D7E-4561-A202-68C0DE02353A}]
    2007-11-16 05:42 144480 --a
    C:\WINDOWS\system32\hnfqjntk.dll
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{11A69AE4-FBED-4832-A2BF-45AF82825583}"= C:\WINDOWS\system32\hnfqjntk.dll [2007-11-16 05:42 144480]
    [HKEY_CLASSES_ROOT\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IMJPMIG8.1"="C:\WINDOWS\IME\imjp8_1\IMJPMIG.exe" [2004-08-04 00:32]
    "MSPY2002"="C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 00:31]
    "PHIME2002ASync"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "PHIME2002A"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "C-Media Mixer"="Mixer.exe" [2002-06-12 02:23 C:\WINDOWS\mixer.exe]
    "D-Link AirPlus G"="C:\Program Files\D-Link\AirPlus G\AirGCFG.exe" [2004-11-19 08:15]
    "ANIWZCS2Service"="C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2004-10-22 12:42]
    "NAV Agent"="C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe" [2001-08-16 16:52]
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MsnMsgr"="C:\Program Files\MSN Messenger\MsnMsgr.exe" [2007-01-19 11:54]
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\hnfqjntk]
    hnfqjntk.dll 2007-11-16 05:42 144480 C:\WINDOWS\system32\hnfqjntk.dll
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    "Authentication Packages"= msv1_0 C:\WINDOWS\system32\gebcc.dll
    R3 NPDriver;Norton Unerase Protection Driver;\??\C:\WINDOWS\system32\Drivers\NPDRIVER.SYS
    S3 CEDRIVER53;CEDRIVER53;\??\C:\Program Files\Cheat Engine\dbk32.sys
    S3 DADriv1;DADriv1;\??\C:\Nexon\MapleStory\Engine\DAK32.sys
    S3 DragonZ1;DragonZ1;\??\C:\Documents and Settings\Nick\Desktop\dragonz\DragonZ.sys
    S3 dump_wmimmc;dump_wmimmc;\??\C:\Nexon\MapleStory\GameGuard\dump_wmimmc.sys
    S3 IlvMoneyDRIVER53;IlvMoneyDRIVER53;\??\C:\Documents and Settings\Nick\Desktop\iLove HackPack\iLove HackPack\MoonLight_Engine_1083.3\IlvMoney1083.sys
    S3 krdpdre;krdpdre;\??\C:\DOCUME~1\Nick\LOCALS~1\Temp\krdpdre.sys
    S3 XDva031;XDva031;\??\C:\WINDOWS\system32\XDva031.sys
    .
    Contents of the 'Scheduled Tasks' folder
    "2007-10-06 13:24:57 C:\WINDOWS\Tasks\Norton AntiVirus - Scan my computer.job"
    "2007-10-12 21:39:50 C:\WINDOWS\Tasks\Norton SystemWorks One Button Checkup.job"
    "2007-11-16 08:30:02 C:\WINDOWS\Tasks\RegSweep Scheduled Scan.job"
    - C:\Program Files\RegSweep\RegSweep.exe
    "2007-11-16 11:20:42 C:\WINDOWS\Tasks\Symantec NetDetect.job"
    - C:\Program Files\Symantec\LiveUpdate\NDETECT.EXE
    .
    **************************************************************************
    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-16 06:20:21
    Windows 5.1.2600 Service Pack 2 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    .
    Completion time: 2007-11-16 6:24:21 - machine was rebooted
    .
    --- E O F ---
  • edited November 2007
    and finally the HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:27:39 AM, on 16/11/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: (no name) - {55F7CA4F-0E86-4BF5-8543-980DEE13AE31} - \
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: WebAssist - {85589B5D-D53D-4237-A677-46B82EA275F3} - C:\WINDOWS\system32\aH8QuNgy.dll
    O2 - BHO: {7303d67e-6d26-5dd8-8da4-9cced533a968} - {869a335d-ecc9-4ad8-8dd5-62d6e76d3037} - C:\WINDOWS\system32\fmgnhrmd.dll
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: (no name) - {A95B2816-1D7E-4561-A202-68C0DE02353A} - C:\WINDOWS\system32\hnfqjntk.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Security Toolbar - {11A69AE4-FBED-4832-A2BF-45AF82825583} - C:\WINDOWS\system32\hnfqjntk.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.2.100.cab
    O16 - DPF: {5F5F9FB8-878E-4455-95E0-F64B2314288A} (ijjiPlugin2 Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin11USA.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} (HGPlugin9USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
    O16 - DPF: {DD583921-A9E9-4FBF-9266-8DC2AB5EA0AF} (HGPlugin10USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin10USA.cab
    O20 - Winlogon Notify: hnfqjntk - C:\WINDOWS\SYSTEM32\hnfqjntk.dll
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    --
    End of file - 5489 bytes

    and still again the yello sign didnt remove D: zomg getting mad
  • edited November 2007
    Hi jinlord
    Did you run combofix from user account which has administrator rights?


    IMPORTANT You must be logged onto an account with administrator privileges

    Run HijackThis
    Click on the Scan button
    Put a check beside all of the items listed below (if present):

    O2 - BHO: (no name) - {55F7CA4F-0E86-4BF5-8543-980DEE13AE31} - \
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file
    O2 - BHO: WebAssist - {85589B5D-D53D-4237-A677-46B82EA275F3} - C:\WINDOWS\system32\aH8QuNgy.dll
    O2 - BHO: {7303d67e-6d26-5dd8-8da4-9cced533a968} - {869a335d-ecc9-4ad8-8dd5-62d6e76d3037} - C:\WINDOWS\system32\fmgnhrmd.dll
    O2 - BHO: (no name) - {A95B2816-1D7E-4561-A202-68C0DE02353A} - C:\WINDOWS\system32\hnfqjntk.dll
    O3 - Toolbar: Security Toolbar - {11A69AE4-FBED-4832-A2BF-45AF82825583} - C:\WINDOWS\system32\hnfqjntk.dll
    O20 - Winlogon Notify: hnfqjntk - C:\WINDOWS\SYSTEM32\hnfqjntk.dll


    Close all open windows and browsers/email, etc...
    Click on the "Fix Checked" button
    When completed, close the application.



    Open notepad and copy/paste the text in the quotebox below into it:
    File::
    C:\WINDOWS\system32\devtyxry.dll
    C:\WINDOWS\system32\fmgnhrmd.dll
    C:\WINDOWS\system32\hnfqjntk.dll
    C:\WINDOWS\system32\vbjyobmb.dll
    C:\WINDOWS\system32\fpqrcbvx.exe
    C:\WINDOWS\system32\dujfyjnx.dll
    C:\WINDOWS\system32\tlyltfye.exe
    C:\WINDOWS\system32\wufvkjxs.dll
    C:\WINDOWS\system32\kfgtkndd.dll
    C:\WINDOWS\system32\wilwvlhf.exe
    C:\WINDOWS\system32\acpbrdmw.exe
    C:\WINDOWS\system32\VCCLSID.exe
    C:\WINDOWS\system32\gjbxnrti.exe
    C:\WINDOWS\system32\cwbeecpn.dll
    C:\WINDOWS\system32\vfabkhgm.exe
    C:\WINDOWS\system32\aH8QuNgy.dll
    C:\WINDOWS\system32\xtyxqcfj.exe
    C:\WINDOWS\system32\rwakukog.exe
    C:\WINDOWS\system32\eqmlgobv.dll
    C:\WINDOWS\system32\ccqjklym.exe
    C:\WINDOWS\system32\ecnjivgm.exe
    C:\WINDOWS\system32\nlmqmtky.dll
    C:\WINDOWS\system32\wxkxutpj.exe
    C:\WINDOWS\system32\ixtfpjqq.dll
    C:\WINDOWS\system32\mmuoxhph.exe
    C:\WINDOWS\system32\gotlvgdt.exe
    C:\WINDOWS\system32\M16Lc7vs.dll
    C:\WINDOWS\system32\kyxfhbpl.dll
    C:\WINDOWS\system32\bxlvsyjo.exe
    C:\WINDOWS\system32\wboqsqat.exe
    C:\WINDOWS\system32\xhvratle.exe
    C:\WINDOWS\system32\mljklji.dll
    C:\WINDOWS\system32\ikdmoaco.dll
    C:\WINDOWS\system32\nrhjvoip.exe
    C:\WINDOWS\system32\etfprvfo.exe
    C:\WINDOWS\system32\pfvsnkaf.exe
    C:\WINDOWS\system32\bndbbhds.exe
    C:\WINDOWS\system32\bchdajyc.exe
    C:\WINDOWS\system32\ihuehoxi.exe
    C:\WINDOWS\system32\rvyrkbxk.dll
    C:\WINDOWS\system32\wiyvrawi.exe
    C:\WINDOWS\system32\kahfonla.exe
    C:\WINDOWS\system32\lbebrimt.dll
    C:\WINDOWS\system32\ntacqham.exe
    C:\WINDOWS\system32\seulsrso.exe
    C:\WINDOWS\system32\mhlfpyix.exe
    C:\WINDOWS\system32\smtPbiTI.dll
    C:\WINDOWS\system32\vhtrwtxd.exe
    C:\WINDOWS\system32\pndwxtmt.exe
    C:\WINDOWS\system32\bqcxefyd.exe
    C:\WINDOWS\system32\yhqdxfgp.exe
    C:\WINDOWS\system32\vqcxvvmg.exe
    C:\WINDOWS\system32\mcbrmyfh.exe
    C:\WINDOWS\system32\ysjtolre.exe
    C:\WINDOWS\system32\cbxwtrr.dll
    C:\WINDOWS\system32\iifdecc.dll
    C:\WINDOWS\system32\ylpgyare.exe
    C:\WINDOWS\system32\swojaywi.exe
    C:\WINDOWS\system32\iiiiiii.dll
    C:\WINDOWS\system32\yayvvvt.dll
    C:\WINDOWS\system32\65f475kH.exe
    C:\DOCUME~1\Nick\LOCALS~1\Temp \krdpdre.sys
    
    Folder::
    C:\WINDOWS\system32\rMa01yy
    C:\Temp
    C:\WINDOWS\Tmljaw
    C:\WINDOWS\system32\Mz02r
    
    Driver::
    krdpdre 
    
    Registry::
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{55F7CA4F-0E86-4BF5-8543-980DEE13AE31}]
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{85589B5D-D53D-4237-A677-46B82EA275F3}]
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{869a335d-ecc9-4ad8-8dd5-62d6e76d3037}]
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A95B2816-1D7E-4561-A202-68C0DE02353A}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{11A69AE4-FBED-4832-A2BF-45AF82825583}"=-
    [-HKEY_CLASSES_ROOT\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}]
    [-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\hnfqjntk] 
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Lsa]
    "Authentication Packages"=hex(7):6d,73,76,31,5f,30,00,00
    
    
    Save this as "CFScript"

    Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

    CFScript.gif

    This will start ComboFix again. After reboot, (in case it asks to reboot),



    Download F-Secure Blacklight (fsbl.exe) to the desktop from here

    Open it and click Accept Agreement.
    Click Scan.
    After the scan is complete, click Next, then Exit.
    It will create a log on the desktop named fsbl-xxxxxxx.log (the xxxxxxx will be the date and time of the scan)
    Save the log to your desktop.

    So in your next reply, please include the following:
    Combofix.txt
    fsbl.log
    new HijackThis log

    Please let me know how your pc is now.
  • edited November 2007
    Hi peku006 here is the new ComboFis log:

    ComboFix 07-11-08.1 - Nick 2007-11-16 21:55:02.6 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.231 [GMT -5:00]
    Running from: C:\Documents and Settings\Nick\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\Nick\Desktop\CFScript.txt
    * Created a new restore point
    FILE
    C:\DOCUME~1\Nick\LOCALS~1\Temp \krdpdre.sys
    C:\WINDOWS\system32\65f475kH.exe
    C:\WINDOWS\system32\acpbrdmw.exe
    C:\WINDOWS\system32\aH8QuNgy.dll
    C:\WINDOWS\system32\bchdajyc.exe
    C:\WINDOWS\system32\bndbbhds.exe
    C:\WINDOWS\system32\bqcxefyd.exe
    C:\WINDOWS\system32\bxlvsyjo.exe
    C:\WINDOWS\system32\cbxwtrr.dll
    C:\WINDOWS\system32\ccqjklym.exe
    C:\WINDOWS\system32\cwbeecpn.dll
    C:\WINDOWS\system32\devtyxry.dll
    C:\WINDOWS\system32\dujfyjnx.dll
    C:\WINDOWS\system32\ecnjivgm.exe
    C:\WINDOWS\system32\eqmlgobv.dll
    C:\WINDOWS\system32\etfprvfo.exe
    C:\WINDOWS\system32\fmgnhrmd.dll
    C:\WINDOWS\system32\fpqrcbvx.exe
    C:\WINDOWS\system32\gjbxnrti.exe
    C:\WINDOWS\system32\gotlvgdt.exe
    C:\WINDOWS\system32\hnfqjntk.dll
    C:\WINDOWS\system32\ihuehoxi.exe
    C:\WINDOWS\system32\iifdecc.dll
    C:\WINDOWS\system32\iiiiiii.dll
    C:\WINDOWS\system32\ikdmoaco.dll
    C:\WINDOWS\system32\ixtfpjqq.dll
    C:\WINDOWS\system32\kahfonla.exe
    C:\WINDOWS\system32\kfgtkndd.dll
    C:\WINDOWS\system32\kyxfhbpl.dll
    C:\WINDOWS\system32\lbebrimt.dll
    C:\WINDOWS\system32\M16Lc7vs.dll
    C:\WINDOWS\system32\mcbrmyfh.exe
    C:\WINDOWS\system32\mhlfpyix.exe
    C:\WINDOWS\system32\mljklji.dll
    C:\WINDOWS\system32\mmuoxhph.exe
    C:\WINDOWS\system32\nlmqmtky.dll
    C:\WINDOWS\system32\nrhjvoip.exe
    C:\WINDOWS\system32\ntacqham.exe
    C:\WINDOWS\system32\pfvsnkaf.exe
    C:\WINDOWS\system32\pndwxtmt.exe
    C:\WINDOWS\system32\rvyrkbxk.dll
    C:\WINDOWS\system32\rwakukog.exe
    C:\WINDOWS\system32\seulsrso.exe
    C:\WINDOWS\system32\smtPbiTI.dll
    C:\WINDOWS\system32\swojaywi.exe
    C:\WINDOWS\system32\tlyltfye.exe
    C:\WINDOWS\system32\vbjyobmb.dll
    C:\WINDOWS\system32\VCCLSID.exe
    C:\WINDOWS\system32\vfabkhgm.exe
    C:\WINDOWS\system32\vhtrwtxd.exe
    C:\WINDOWS\system32\vqcxvvmg.exe
    C:\WINDOWS\system32\wboqsqat.exe
    C:\WINDOWS\system32\wilwvlhf.exe
    C:\WINDOWS\system32\wiyvrawi.exe
    C:\WINDOWS\system32\wufvkjxs.dll
    C:\WINDOWS\system32\wxkxutpj.exe
    C:\WINDOWS\system32\xhvratle.exe
    C:\WINDOWS\system32\xtyxqcfj.exe
    C:\WINDOWS\system32\yayvvvt.dll
    C:\WINDOWS\system32\yhqdxfgp.exe
    C:\WINDOWS\system32\ylpgyare.exe
    C:\WINDOWS\system32\ysjtolre.exe
    .
    Unable to gain System Privileges
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    C:\Documents and Settings\All Users\Start Menu\Live Safety Center.lnk
    C:\Documents and Settings\All Users\Start Menu\Online Security Guide.lnk
    C:\Documents and Settings\NetworkService\Application Data\NetMon
    C:\Documents and Settings\NetworkService\Application Data\NetMon\domains.txt
    C:\Documents and Settings\NetworkService\Application Data\NetMon\log.txt
    C:\Documents and Settings\Nick\Desktop\Live Safety Center.lnk
    C:\Documents and Settings\Nick\Desktop\Online Security Guide.lnk
    C:\Documents and Settings\Nick\Favorites\Online Security Guide.lnk
    C:\Program Files\ttx.exe
    C:\Temp
    C:\Temp\abW9\tOasF.log
    C:\Temp\abW9\tPho.log
    C:\Temp\mZOr\tOasF.log
    C:\WINDOWS\system32\65f475kH.exe
    C:\WINDOWS\system32\acpbrdmw.exe
    C:\WINDOWS\system32\aH8QuNgy.dll
    C:\WINDOWS\system32\bchdajyc.exe
    C:\WINDOWS\system32\bndbbhds.exe
    C:\WINDOWS\system32\bqcxefyd.exe
    C:\WINDOWS\system32\bxlvsyjo.exe
    C:\WINDOWS\system32\cbxwtrr.dll
    C:\WINDOWS\system32\ccqjklym.exe
    C:\WINDOWS\system32\cwbeecpn.dll
    C:\WINDOWS\system32\ddcawxy.dll
    C:\WINDOWS\system32\devtyxry.dll
    C:\WINDOWS\system32\dujfyjnx.dll
    C:\WINDOWS\system32\ecnjivgm.exe
    C:\WINDOWS\system32\eqmlgobv.dll
    C:\WINDOWS\system32\etfprvfo.exe
    C:\WINDOWS\system32\fmgnhrmd.dll
    C:\WINDOWS\system32\fpqrcbvx.exe
    C:\WINDOWS\system32\gjbxnrti.exe
    C:\WINDOWS\system32\gjkmp.bak1
    C:\WINDOWS\system32\gjkmp.bak2
    C:\WINDOWS\system32\gjkmp.ini
    C:\WINDOWS\system32\gotlvgdt.exe
    C:\WINDOWS\system32\hnfqjntk.dll
    C:\WINDOWS\system32\hnfqjntk.dllbox
    C:\WINDOWS\system32\ihuehoxi.exe
    C:\WINDOWS\system32\iifdecc.dll
    C:\WINDOWS\system32\iiiiiii.dll
    C:\WINDOWS\system32\ikdmoaco.dll
    C:\WINDOWS\system32\ixtfpjqq.dll
    C:\WINDOWS\system32\kahfonla.exe
    C:\WINDOWS\system32\kfgtkndd.dll
    C:\WINDOWS\system32\kyxfhbpl.dll
    C:\WINDOWS\system32\lbebrimt.dll
    C:\WINDOWS\system32\M16Lc7vs.dll
    C:\WINDOWS\system32\mcbrmyfh.exe
    C:\WINDOWS\system32\mhlfpyix.exe
    C:\WINDOWS\system32\mljklji.dll
    C:\WINDOWS\system32\mmuoxhph.exe
    C:\WINDOWS\system32\Mz02r
    C:\WINDOWS\system32\Mz02r\Mz02r1065.exe
    C:\WINDOWS\system32\nlmqmtky.dll
    C:\WINDOWS\system32\nrhjvoip.exe
    C:\WINDOWS\system32\ntacqham.exe
    C:\WINDOWS\system32\pac.txt
    C:\WINDOWS\system32\pfvsnkaf.exe
    C:\WINDOWS\system32\pmkjg.dll
    C:\WINDOWS\system32\pndwxtmt.exe
    C:\WINDOWS\system32\rMa01yy
    C:\WINDOWS\system32\rMa01yy\rMa01yy1065.exe
    C:\WINDOWS\system32\rvyrkbxk.dll
    C:\WINDOWS\system32\rwakukog.exe
    C:\WINDOWS\system32\seulsrso.exe
    C:\WINDOWS\system32\smtPbiTI.dll
    C:\WINDOWS\system32\swojaywi.exe
    C:\WINDOWS\system32\tlyltfye.exe
    C:\WINDOWS\system32\vbjyobmb.dll
    C:\WINDOWS\system32\vfabkhgm.exe
    C:\WINDOWS\system32\vhtrwtxd.exe
    C:\WINDOWS\system32\vqcxvvmg.exe
    C:\WINDOWS\system32\wboqsqat.exe
    C:\WINDOWS\system32\wilwvlhf.exe
    C:\WINDOWS\system32\winnb58.dll
    C:\WINDOWS\system32\wiyvrawi.exe
    C:\WINDOWS\system32\wufvkjxs.dll
    C:\WINDOWS\system32\wxkxutpj.exe
    C:\WINDOWS\system32\xhvratle.exe
    C:\WINDOWS\system32\xtyxqcfj.exe
    C:\WINDOWS\system32\yayvvvt.dll
    C:\WINDOWS\system32\yhqdxfgp.exe
    C:\WINDOWS\system32\ylpgyare.exe
    C:\WINDOWS\system32\ysjtolre.exe
    C:\WINDOWS\Tmljaw
    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    \LEGACY_DOMAINSERVICE
    \LEGACY_KRDPDRE
    \DomainService
    \krdpdre

    ((((((((((((((((((((((((( Files Created from 2007-10-17 to 2007-11-17 )))))))))))))))))))))))))))))))
    .
    2007-11-16 21:51 184,320 --a
    C:\WINDOWS\system32\wQv3B07G.dll
    2007-11-16 21:47 82,496 --a
    C:\WINDOWS\system32\jlicfnth.dll
    2007-11-16 21:41 85,056 --a
    C:\WINDOWS\system32\ucvvpnqc.dll
    2007-11-16 21:39 71,232 --a
    C:\WINDOWS\system32\bmjdseop.exe
    2007-11-16 07:27 <DIR> d--h
    C:\Program Files\InstallJammer Registry
    2007-11-16 07:26 <DIR> d
    C:\Program Files\Brittle Bullet - Private Gunz Server
    2007-11-16 06:49 <DIR> d
    C:\WINDOWS\system32\uu2
    2007-11-16 06:49 <DIR> d
    C:\WINDOWS\system32\rr2
    2007-11-16 06:49 <DIR> d
    C:\WINDOWS\system32\cc1
    2007-11-16 05:24 <DIR> d
    C:\VundoFix Backups
    2007-11-15 16:16 51,200 --a
    C:\WINDOWS\NirCmd.exe
    2007-11-15 15:48 <DIR> d
    C:\WINDOWS\ERUNT
    2007-11-15 15:30 16,324 --a
    C:\WINDOWS\system32\instdump.zip
    2007-11-14 15:22 <DIR> d
    C:\Program Files\Trend Micro
    2007-11-10 12:14 <DIR> d-a
    C:\Documents and Settings\All Users\Application Data\TEMP
    2007-11-10 12:12 626,688 --a
    C:\WINDOWS\system32\msvcr80.dll
    2007-11-05 18:27 1,060,864 --a
    C:\WINDOWS\system32\mfc71.dll
    2007-11-05 18:27 348,160 --a
    C:\WINDOWS\system32\msvcr71.dll
    2007-11-05 18:27 89,088 --a
    C:\WINDOWS\system32\atl71.dll
    2007-11-05 18:27 24,064 --a
    C:\WINDOWS\system32\msxml3a.dll
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-15 00:38
    d
    w C:\Documents and Settings\Nick\Application Data\mIRC
    2007-11-15 00:35
    d
    w C:\Program Files\mIRC
    2007-10-19 12:57
    d--h--w C:\Program Files\InstallShield Installation Information
    2007-10-12 20:11
    d
    w C:\Documents and Settings\All Users\Application Data\FLEXnet
    2007-10-12 20:03
    d
    w C:\Program Files\Common Files\Adobe
    2007-10-12 20:03
    d
    w C:\Program Files\Bonjour
    2007-10-12 19:43
    d
    w C:\Program Files\Common Files\Macrovision Shared
    2007-10-04 19:42
    d
    w C:\Documents and Settings\All Users\Application Data\NexonUS
    2007-08-02 13:43 282,624 ----a-w C:\Program Files\TTC.dll
    .
    ((((((((((((((((((((((((((((( [EMAIL="snapshot@2007-11-15_16.36.49.40"]snapshot@2007-11-15_16.36.49.40[/EMAIL] )))))))))))))))))))))))))))))))))))))))))
    .
    - 2007-11-08 21:59:01 136,704 ----a-w C:\WINDOWS\catchme.exe
    + 2007-10-29 23:56:19 136,192 ----a-w C:\WINDOWS\catchme.exe
    - 2007-11-15 20:48:29 3,207,168 ----a-w C:\WINDOWS\ERUNT\SDFIX\Users\00000001\NTUSER.DAT
    + 2007-11-16 12:04:45 3,235,840 ----a-w C:\WINDOWS\ERUNT\SDFIX\Users\00000001\NTUSER.DAT
    - 2007-11-15 20:48:29 81,920 ----a-w C:\WINDOWS\ERUNT\SDFIX\Users\00000002\UsrClass.dat
    + 2007-11-16 12:04:45 81,920 ----a-w C:\WINDOWS\ERUNT\SDFIX\Users\00000002\UsrClass.dat
    + 2007-08-14 22:22:50 25,105 ----a-w C:\WINDOWS\system32\cc1\dnslook11.exe
    - 2007-11-15 21:07:10 40,108 ----a-w C:\WINDOWS\system32\perfc009.dat
    + 2007-11-17 02:42:42 40,108 ----a-w C:\WINDOWS\system32\perfc009.dat
    - 2007-11-15 21:07:10 311,912 ----a-w C:\WINDOWS\system32\perfh009.dat
    + 2007-11-17 02:42:42 311,912 ----a-w C:\WINDOWS\system32\perfh009.dat
    + 2007-11-15 11:32:34 9,814 ----a-w C:\WINDOWS\system32\rr2\bemwdll3.exe
    - 2006-01-09 14:36:06 40,960 ----a-w C:\WINDOWS\system32\swsc.exe
    + 2006-11-29 22:21:29 370,688 ----a-w C:\WINDOWS\system32\swsc.exe
    - 2006-12-01 10:20:34 79,360 ----a-w C:\WINDOWS\system32\swxcacls.exe
    + 2006-12-01 10:20:32 212,480 ----a-w C:\WINDOWS\system32\swxcacls.exe
    + 2007-08-03 01:44:02 169,147 ----a-w C:\WINDOWS\system32\uu2\mper83122.exe
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9432f445-c71d-4573-95e8-deb6b26fe756}]
    2007-11-16 21:47 82496 --a
    C:\WINDOWS\system32\jlicfnth.dll
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser]
    "{9A9C9B68-F908-4AAB-8D0C-10EA8997F37E}"= C:\WINDOWS\system32\WinNB58.dll [ ]
    [HKEY_CLASSES_ROOT\CLSID\{9A9C9B68-F908-4AAB-8D0C-10EA8997F37E}]
    [HKEY_CLASSES_ROOT\TypeLib\{566DEDE9-9ED8-45DA-9BE6-9B2EEAB17F49}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IMJPMIG8.1"="C:\WINDOWS\IME\imjp8_1\IMJPMIG.exe" [2004-08-04 00:32]
    "MSPY2002"="C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 00:31]
    "PHIME2002ASync"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "PHIME2002A"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "C-Media Mixer"="Mixer.exe" [2002-06-12 02:23 C:\WINDOWS\mixer.exe]
    "D-Link AirPlus G"="C:\Program Files\D-Link\AirPlus G\AirGCFG.exe" [2004-11-19 08:15]
    "ANIWZCS2Service"="C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2004-10-22 12:42]
    "NAV Agent"="C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe" [2001-08-16 16:52]
    "50da98e0"="C:\WINDOWS\system32\ucvvpnqc.dll" [2007-11-16 21:41]
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MsnMsgr"="C:\Program Files\MSN Messenger\MsnMsgr.exe" [2007-01-19 11:54]
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    "Authentication Packages"= msv1_0 C:\WINDOWS\system32\pmkjg.dll
    R3 NPDriver;Norton Unerase Protection Driver;\??\C:\WINDOWS\system32\Drivers\NPDRIVER.SYS
    S3 CEDRIVER53;CEDRIVER53;\??\C:\Program Files\Cheat Engine\dbk32.sys
    S3 DADriv1;DADriv1;\??\C:\Nexon\MapleStory\Engine\DAK32.sys
    S3 DragonZ1;DragonZ1;\??\C:\Documents and Settings\Nick\Desktop\dragonz\DragonZ.sys
    S3 dump_wmimmc;dump_wmimmc;\??\C:\Nexon\MapleStory\GameGuard\dump_wmimmc.sys
    S3 IlvMoneyDRIVER53;IlvMoneyDRIVER53;\??\C:\Documents and Settings\Nick\Desktop\iLove HackPack\iLove HackPack\MoonLight_Engine_1083.3\IlvMoney1083.sys
    S3 XDva031;XDva031;\??\C:\WINDOWS\system32\XDva031.sys
    .
    Contents of the 'Scheduled Tasks' folder
    "2007-10-06 13:24:57 C:\WINDOWS\Tasks\Norton AntiVirus - Scan my computer.job"
    "2007-10-12 21:39:50 C:\WINDOWS\Tasks\Norton SystemWorks One Button Checkup.job"
    "2007-11-16 08:30:02 C:\WINDOWS\Tasks\RegSweep Scheduled Scan.job"
    - C:\Program Files\RegSweep\RegSweep.exe
    "2007-11-17 03:12:13 C:\WINDOWS\Tasks\Symantec NetDetect.job"
    - C:\Program Files\Symantec\LiveUpdate\NDETECT.EXE
    .
    **************************************************************************
    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-16 22:12:27
    Windows 5.1.2600 Service Pack 2 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    .
    Completion time: 2007-11-16 22:13:58
    C:\ComboFix2.txt ... 2007-11-16 06:24
    .
    --- E O F ---
  • edited November 2007
    here is the fsbl log:

    11/16/07 22:17:36 [Info]: BlackLight Engine 1.0.67 initialized
    11/16/07 22:17:36 [Info]: OS: 5.1 build 2600 (Service Pack 2)
    11/16/07 22:17:37 [Note]: 7019 4
    11/16/07 22:17:37 [Note]: 7005 0
    11/16/07 22:17:41 [Note]: 7006 0
    11/16/07 22:17:41 [Note]: 7011 3548
    11/16/07 22:17:42 [Note]: 7026 0
    11/16/07 22:17:42 [Note]: 7026 0
    11/16/07 22:17:49 [Note]: FSRAW library version 1.7.1024
    11/16/07 22:19:55 [Note]: 7007 0
  • edited November 2007
    My HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:21:53 PM, on 16/11/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    C:\Program Files\MSN Messenger\MsnMsgr.Exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: {657ef62b-6bed-8e59-3754-d17c544f2349} - {9432f445-c71d-4573-95e8-deb6b26fe756} - C:\WINDOWS\system32\jlicfnth.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    O4 - HKLM\..\Run: [50da98e0] rundll32.exe "C:\WINDOWS\system32\ucvvpnqc.dll",b
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.2.100.cab
    O16 - DPF: {5F5F9FB8-878E-4455-95E0-F64B2314288A} (ijjiPlugin2 Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin11USA.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} (HGPlugin9USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
    O16 - DPF: {DD583921-A9E9-4FBF-9266-8DC2AB5EA0AF} (HGPlugin10USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin10USA.cab
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    --
    End of file - 4899 bytes

    and yea thank you soo much peku006 the wierd pop ups and the triangle thing are all gone and my computer is faster again! Once again thank you peku006 your the greatest :D
  • edited November 2007
    Hi jinlord
    • Run HijackThis
    • Click on the Scan button
    • Put a check beside all of the items listed below (if present):

      O2 - BHO: {657ef62b-6bed-8e59-3754-d17c544f2349} - {9432f445-c71d-4573-95e8-deb6b26fe756} - C:\WINDOWS\system32\jlicfnth.dll
      O4 - HKLM\..\Run: [50da98e0] rundll32.exe "C:\WINDOWS\system32\ucvvpnqc.dll",
      b
    • Close all open windows and browsers/email, etc...
    • Click on the "Fix Checked" button
    • When completed, close the application.


    Open notepad and copy/paste the text in the quotebox below into it:
    File::
    C:\WINDOWS\system32\wQv3B07G.dll
    C:\WINDOWS\system32\jlicfnth.dll
    C:\WINDOWS\system32\ucvvpnqc.dll
    C:\WINDOWS\system32\bmjdseop.exe
    C:\WINDOWS\system32\pmkjg.dll
    C:\Program Files\Cheat Engine\dbk32.sys
    C:\Nexon\MapleStory\Ga meGuard\dump_wmimmc.sys
    C:\WINDOWS\system32\XDva031.sys
    
    Folder::
    C:\WINDOWS\system32\uu2
    C:\WINDOWS\system32\rr2
    C:\WINDOWS\system32\cc1
    
    Driver::
    CEDRIVER53
    dump_wmimmc
    XDva031
    
    Registry::
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9432f445-c71d-4573-95e8-deb6b26fe756}]
    [-HKEY_CLASSES_ROOT\CLSID\{9A9C9B68-F908-4AAB-8D0C-10EA8997F37E}]
    [-HKEY_CLASSES_ROOT\TypeLib\{566DEDE9-9ED8-45DA-9BE6-9B2EEAB17F49}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "50da98e0"=-
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Lsa]
    "Authentication Packages"=hex(7):6d,73,76,31,5f,30,00,00
    
    
    Save this as "CFScript"

    Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

    CFScript.gif

    This will start ComboFix again. After reboot, (in case it asks to reboot)


    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it.

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.


    Download AVG Anti-Spyware from HERE and save that file to your desktop. Note for AVG Free anti-virus users only: this is not the same program that you already have, this is an anti-spyware program.

    When the trial period expires it becomes feature-limited freeware but is still worth keeping as a good on-demand scanner.
    • Once you have downloaded AVG Anti-Spyware, locate the icon on the desktop and double click it to launch the set up program.
    • Once the setup is complete you will need run AVG Anti-Spyware and update the definition files.
    • On the main screen select the icon "Update" then select the "Update now" link.
    • Next select the "Start Update" button. The update will start and a progress bar will show the updates being installed.
    • Once the update has completed, select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
    • Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
      Under "Reports"
    • Select "Automatically generate report after every scan"
    • Un-Select "Only if threats were found"
    • Close AVG Anti-Spyware. Do Not run a scan just yet, we will run it in safe mode.
    Reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.

    IMPORTANT: Do not open any other windows or programs while AVG Anti-Spyware is scanning as it may interfere with the scanning process:
    • Launch AVG Anti-Spyware by double clicking the icon on your desktop.
    • Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
      AVG will now begin the scanning process. Please be patient as this may take a little time.
    • Once the scan is complete, do the following:
    • If you have any infections you will be prompted. Then select "Apply all actions."
    • Next select the "Reports" icon at the top.
    • Select the "Save report as" button in the lower left-hand of the screen and save it to a text file on your system (make sure to remember where you saved that file. This is important).
    • Close AVG Anti-Spyware and reboot your system back into Normal Mode.
    So in your next reply, please include the following:
    Combofix.txt
    AVG Anti-Spyware report
    new HijackThis log
  • edited November 2007
    Hi peku006!

    Heres my CF log:

    ComboFix 07-11-08.1 - Nick 2007-11-17 7:43:59.7 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.316 [GMT -5:00]
    Running from: C:\Documents and Settings\Nick\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\Nick\Desktop\CFScript.txt
    * Created a new restore point
    FILE
    C:\Nexon\MapleStory\Ga meGuard\dump_wmimmc.sys
    C:\Program Files\Cheat Engine\dbk32.sys
    C:\WINDOWS\system32\bmjdseop.exe
    C:\WINDOWS\system32\jlicfnth.dll
    C:\WINDOWS\system32\pmkjg.dll
    C:\WINDOWS\system32\ucvvpnqc.dll
    C:\WINDOWS\system32\wQv3B07G.dll
    C:\WINDOWS\system32\XDva031.sys
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    C:\WINDOWS\system32\bmjdseop.exe
    C:\WINDOWS\system32\cc1
    C:\WINDOWS\system32\cc1\dnslook11.exe
    C:\WINDOWS\system32\rr2
    C:\WINDOWS\system32\rr2\bemwdll3.exe
    C:\WINDOWS\system32\ucvvpnqc.dll
    C:\WINDOWS\system32\uu2
    C:\WINDOWS\system32\uu2\mper83122.exe
    C:\WINDOWS\system32\wQv3B07G.dll
    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    \LEGACY_CEDRIVER53
    \LEGACY_DUMP_WMIMMC
    \LEGACY_XDVA031
    \CEDRIVER53
    \XDva031

    ((((((((((((((((((((((((( Files Created from 2007-10-17 to 2007-11-17 )))))))))))))))))))))))))))))))
    .
    2007-11-16 07:27 <DIR> d--h
    C:\Program Files\InstallJammer Registry
    2007-11-15 16:16 51,200 --a
    C:\WINDOWS\NirCmd.exe
    2007-11-15 15:48 <DIR> d
    C:\WINDOWS\ERUNT
    2007-11-15 15:30 16,324 --a
    C:\WINDOWS\system32\instdump.zip
    2007-11-14 15:22 <DIR> d
    C:\Program Files\Trend Micro
    2007-11-10 12:14 <DIR> d-a
    C:\Documents and Settings\All Users\Application Data\TEMP
    2007-11-10 12:12 626,688 --a
    C:\WINDOWS\system32\msvcr80.dll
    2007-11-05 18:27 1,060,864 --a
    C:\WINDOWS\system32\mfc71.dll
    2007-11-05 18:27 348,160 --a
    C:\WINDOWS\system32\msvcr71.dll
    2007-11-05 18:27 89,088 --a
    C:\WINDOWS\system32\atl71.dll
    2007-11-05 18:27 24,064 --a
    C:\WINDOWS\system32\msxml3a.dll
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-15 00:38
    d
    w C:\Documents and Settings\Nick\Application Data\mIRC
    2007-11-15 00:35
    d
    w C:\Program Files\mIRC
    2007-10-19 12:57
    d--h--w C:\Program Files\InstallShield Installation Information
    2007-10-12 20:11
    d
    w C:\Documents and Settings\All Users\Application Data\FLEXnet
    2007-10-12 20:03
    d
    w C:\Program Files\Common Files\Adobe
    2007-10-12 20:03
    d
    w C:\Program Files\Bonjour
    2007-10-12 19:43
    d
    w C:\Program Files\Common Files\Macrovision Shared
    2007-10-04 19:42
    d
    w C:\Documents and Settings\All Users\Application Data\NexonUS
    2007-08-02 13:43 282,624 ----a-w C:\Program Files\TTC.dll
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IMJPMIG8.1"="C:\WINDOWS\IME\imjp8_1\IMJPMIG.exe" [2004-08-04 00:32]
    "MSPY2002"="C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 00:31]
    "PHIME2002ASync"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "PHIME2002A"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "C-Media Mixer"="Mixer.exe" [2002-06-12 02:23 C:\WINDOWS\mixer.exe]
    "D-Link AirPlus G"="C:\Program Files\D-Link\AirPlus G\AirGCFG.exe" [2004-11-19 08:15]
    "ANIWZCS2Service"="C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2004-10-22 12:42]
    "NAV Agent"="C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe" [2001-08-16 16:52]
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MsnMsgr"="C:\Program Files\MSN Messenger\MsnMsgr.exe" [2007-01-19 11:54]
    R3 NPDriver;Norton Unerase Protection Driver;\??\C:\WINDOWS\system32\Drivers\NPDRIVER.SYS
    S3 DADriv1;DADriv1;\??\C:\Nexon\MapleStory\Engine\DAK32.sys
    S3 DragonZ1;DragonZ1;\??\C:\Documents and Settings\Nick\Desktop\dragonz\DragonZ.sys
    S3 IlvMoneyDRIVER53;IlvMoneyDRIVER53;\??\C:\Documents and Settings\Nick\Desktop\iLove HackPack\iLove HackPack\MoonLight_Engine_1083.3\IlvMoney1083.sys
    .
    Contents of the 'Scheduled Tasks' folder
    "2007-10-06 13:24:57 C:\WINDOWS\Tasks\Norton AntiVirus - Scan my computer.job"
    "2007-10-12 21:39:50 C:\WINDOWS\Tasks\Norton SystemWorks One Button Checkup.job"
    "2007-11-17 08:30:00 C:\WINDOWS\Tasks\RegSweep Scheduled Scan.job"
    - C:\Program Files\RegSweep\RegSweep.exe
    "2007-11-17 12:48:28 C:\WINDOWS\Tasks\Symantec NetDetect.job"
    - C:\Program Files\Symantec\LiveUpdate\NDETECT.EXE
    .
    **************************************************************************
    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-17 07:48:34
    Windows 5.1.2600 Service Pack 2 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    .
    Completion time: 2007-11-17 7:49:49 - machine was rebooted
    .
    --- E O F ---
  • edited November 2007
    Hi jinlord

    I need a new HijackThis log and AVG Anti-Spyware report too
  • edited November 2007
    Sorry peku006 the AVG took quite long so i had to do it tomorow and now here it is:

    AVG Anti-Spyware - Scan Report
    + Created at: 2:25:55 AM 18/11/2007
    + Scan result:

    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374389.dll -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374390.exe -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376565.dll -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376573.exe -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376574.exe -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0382398.dll -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0382399.exe -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383572.dll -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383575.exe -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383576.exe -> Adware.CommAd : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP30\A0195850.exe -> Backdoor.Agent.ark : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0327395.exe -> Downloader.Adload.ni : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0356719.exe -> Downloader.Adload.ni : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374395.exe -> Downloader.Adload.ni : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376583.exe -> Downloader.Adload.ni : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP26\A0175747.exe -> Downloader.Agent.bkw : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374400.exe -> Downloader.Agent.cbx : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376570.exe -> Downloader.Agent.cbx : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0328068.EXE -> Downloader.Agent.ebm : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0318328.exe -> Downloader.Agent.emo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0325105.exe -> Downloader.Agent.emo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0327208.exe -> Downloader.Agent.emo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0347462.exe -> Downloader.Agent.emo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374402.exe -> Downloader.Agent.emo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376575.EXE -> Downloader.Agent.emo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0342109.exe -> Downloader.Agent.erf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0356718.exe -> Downloader.Agent.erf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374398.exe -> Downloader.Agent.erf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376568.exe -> Downloader.Agent.erf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0347470.exe -> Downloader.Agent.fak : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0367460.exe -> Downloader.Agent.fak : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375430.exe -> Downloader.BHO.bo : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0328067.EXE -> Downloader.Small.buy : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374392.exe -> Downloader.Small.buy : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374397.exe -> Downloader.Small.buy : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376567.exe -> Downloader.Small.buy : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376579.EXE -> Downloader.Small.buy : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387418.exe -> Downloader.Small.buy : Cleaned.
    C:\qoobox\Quarantine\C\WINDOWS\system32\cc1\dnslook11.exe.vir -> Downloader.Small.buy : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0325104.exe -> Downloader.VB.bkw : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384428.exe -> Downloader.VB.bkw : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP23\A0165588.exe -> Not-A-Virus.HackTool.Win32.Delf.bw : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374396.exe -> Not-A-Virus.Monitor.Win32.NetMon.a : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376578.exe -> Not-A-Virus.Monitor.Win32.NetMon.a : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0382401.exe -> Not-A-Virus.Monitor.Win32.NetMon.a : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383580.exe -> Not-A-Virus.Monitor.Win32.NetMon.a : Cleaned.
    C:\Documents and Settings\Nick\Cookies\nick@burstnet[2].txt -> TrackingCookie.Burstnet : Cleaned.
    C:\Documents and Settings\Nick\Cookies\nick@www.burstnet[1].txt -> TrackingCookie.Burstnet : Cleaned.
    C:\Documents and Settings\Nick\Cookies\nick@ssl-hints.netflame[1].txt -> TrackingCookie.Netflame : Cleaned.
    C:\Documents and Settings\Nick\Cookies\nick@tacoda[2].txt -> TrackingCookie.Tacoda : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0320113.exe -> Trojan.Agent.crf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0347464.EXE -> Trojan.Agent.crf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0356876.EXE -> Trojan.Agent.crf : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0381561.dll -> Trojan.Magania.aqw : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0320109.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0321151.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0329010.exe -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374391.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374406.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376577.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376581.VBS -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0382400.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0382406.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383579.vbs -> Trojan.Small : Cleaned.
    C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383582.VBS -> Trojan.Small : Cleaned.

    ::Report end
  • edited November 2007
    And finally the HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 2:30:33 AM, on 18/11/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.2.100.cab
    O16 - DPF: {5F5F9FB8-878E-4455-95E0-F64B2314288A} (ijjiPlugin2 Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin11USA.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} (HGPlugin9USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
    O16 - DPF: {DD583921-A9E9-4FBF-9266-8DC2AB5EA0AF} (HGPlugin10USA Class) - http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin10USA.cab
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    --
    End of file - 4819 bytes

    Thank you peku006 for helping me :D
  • edited November 2007
    Hi jinlord

    Looks much better



    Open notepad and copy/paste the text in the quotebox below into it:
    File::
    C:\Program Files\TTC.dll
    
    Folder::
    C:\qoobox
    
    
    Save this as "CFScript"

    Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

    CFScript.gif

    This will start ComboFix again. After reboot,




    Please do an online scan with Kaspersky Online Scanner. You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
    • The program will launch and then start to download the latest definition files.
    • Once the scanner is installed and the definitions downloaded, click Next.
    • Now click on Scan Settings
    • In the scan settings make sure that the following are selected:

      o Scan using the following Anti-Virus database:

      + Extended (If available otherwise Standard)

      o Scan Options:

      + Scan Archives
      + Scan Mail Bases
    • Click OK
    • Now under select a target to scan select My Computer
    • The scan will take a while so be patient and let it run. Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button
    • Save the file to your desktop.
    • Copy and paste that information in your next post.
    Note for Internet Explorer 7 users: If at any time you have trouble with the accept button of the licence, click on the Zoom tool located at the right bottom of the IE window and set the zoom to 75 %. Once the license accepted, reset to 100%.

    So in your next reply, please include the following:
    Combofix.txt
    Kaspersky Online report
  • edited November 2007
    Hi peku006 :D

    Heres the CF log:

    ComboFix 07-11-08.1 - Nick 2007-11-18 5:04:50.8 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.314 [GMT -5:00]
    Running from: C:\Documents and Settings\Nick\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\Nick\Desktop\CFScript.txt
    * Created a new restore point
    FILE
    C:\Program Files\TTC.dll
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    C:\Program Files\TTC.dll
    C:\qoobox
    C:\qoobox\BackEnv\appdata.folder.dat
    C:\qoobox\BackEnv\cache.folder.dat
    C:\qoobox\BackEnv\desktop.folder.dat
    C:\qoobox\BackEnv\favorites.folder.dat
    C:\qoobox\BackEnv\local appdata.folder.dat
    C:\qoobox\BackEnv\local settings.folder.dat
    C:\qoobox\BackEnv\my pictures.folder.dat
    C:\qoobox\BackEnv\personal.folder.dat
    C:\qoobox\BackEnv\profiles.folder.dat
    C:\qoobox\BackEnv\programs.folder.dat
    C:\qoobox\BackEnv\setpath.bat
    C:\qoobox\BackEnv\setpath.dat
    C:\qoobox\BackEnv\start menu.folder.dat
    C:\qoobox\BackEnv\startup.folder.dat
    C:\qoobox\BackEnv\templates.folder.dat
    C:\qoobox\CFScript_used_2007-11-17@7.43.txt
    C:\qoobox\CFScript_used_2007-11-18@5.04.txt
    C:\qoobox\ComboFix-quarantined-files.txt
    C:\qoobox\Hiv-backup\default
    C:\qoobox\Hiv-backup\ERDNT.CON
    C:\qoobox\Hiv-backup\ERDNT.EXE
    C:\qoobox\Hiv-backup\ERDNT.INF
    C:\qoobox\Hiv-backup\ERDNTDOS.LOC
    C:\qoobox\Hiv-backup\ERDNTWIN.LOC
    C:\qoobox\Hiv-backup\SAM
    C:\qoobox\Hiv-backup\SECURITY
    C:\qoobox\Hiv-backup\software
    C:\qoobox\Hiv-backup\system
    C:\qoobox\Hiv-backup\Users\00000001\NTUSER.DAT
    C:\qoobox\Hiv-backup\Users\00000002\UsrClass.dat
    C:\qoobox\Hiv-backup\Users\00000003\NTUSER.DAT
    C:\qoobox\Hiv-backup\Users\00000004\UsrClass.dat
    C:\qoobox\Hiv-backup\Users\00000005\NTUSER.DAT
    C:\qoobox\Hiv-backup\Users\00000006\UsrClass.dat
    C:\qoobox\snapshot@2007-11-17_ 7.49.03.34.dat
    C:\qoobox\snapshot@2007-11-17_ 7.49.03.34_B.dat
    .
    ((((((((((((((((((((((((( Files Created from 2007-10-18 to 2007-11-18 )))))))))))))))))))))))))))))))
    .
    2007-11-17 07:55 <DIR> d
    C:\Documents and Settings\Nick\Application Data\Grisoft
    2007-11-17 07:55 10,872 --a
    C:\WINDOWS\system32\drivers\AvgAsCln.sys
    2007-11-17 07:54 <DIR> d
    C:\Documents and Settings\All Users\Application Data\Grisoft
    2007-11-16 07:27 <DIR> d--h
    C:\Program Files\InstallJammer Registry
    2007-11-15 16:16 51,200 --a
    C:\WINDOWS\NirCmd.exe
    2007-11-15 15:48 <DIR> d
    C:\WINDOWS\ERUNT
    2007-11-15 15:30 16,324 --a
    C:\WINDOWS\system32\instdump.zip
    2007-11-14 15:22 <DIR> d
    C:\Program Files\Trend Micro
    2007-11-10 12:14 <DIR> d-a
    C:\Documents and Settings\All Users\Application Data\TEMP
    2007-11-10 12:12 626,688 --a
    C:\WINDOWS\system32\msvcr80.dll
    2007-11-05 18:27 1,060,864 --a
    C:\WINDOWS\system32\mfc71.dll
    2007-11-05 18:27 348,160 --a
    C:\WINDOWS\system32\msvcr71.dll
    2007-11-05 18:27 89,088 --a
    C:\WINDOWS\system32\atl71.dll
    2007-11-05 18:27 24,064 --a
    C:\WINDOWS\system32\msxml3a.dll
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-17 16:31
    d
    w C:\Program Files\Common Files\Adobe
    2007-11-17 14:39
    d
    w C:\Documents and Settings\Nick\Application Data\mIRC
    2007-11-17 14:38
    d
    w C:\Program Files\mIRC
    2007-10-19 12:57
    d--h--w C:\Program Files\InstallShield Installation Information
    2007-10-12 20:11
    d
    w C:\Documents and Settings\All Users\Application Data\FLEXnet
    2007-10-12 19:43
    d
    w C:\Program Files\Common Files\Macrovision Shared
    2007-10-04 19:42
    d
    w C:\Documents and Settings\All Users\Application Data\NexonUS
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IMJPMIG8.1"="C:\WINDOWS\IME\imjp8_1\IMJPMIG.exe" [2004-08-04 00:32]
    "MSPY2002"="C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 00:31]
    "PHIME2002ASync"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "PHIME2002A"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.exe" [2004-08-04 00:32]
    "C-Media Mixer"="Mixer.exe" [2002-06-12 02:23 C:\WINDOWS\mixer.exe]
    "D-Link AirPlus G"="C:\Program Files\D-Link\AirPlus G\AirGCFG.exe" [2004-11-19 08:15]
    "ANIWZCS2Service"="C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2004-10-22 12:42]
    "NAV Agent"="C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe" [2001-08-16 16:52]
    "!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 04:25]
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MsnMsgr"="C:\Program Files\MSN Messenger\MsnMsgr.exe" [2007-01-19 11:54]
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
    "DisableRegistryTools"=0 (0x0)
    R3 NPDriver;Norton Unerase Protection Driver;\??\C:\WINDOWS\system32\Drivers\NPDRIVER.SYS
    S3 DADriv1;DADriv1;\??\C:\Nexon\MapleStory\Engine\DAK32.sys
    S3 DragonZ1;DragonZ1;\??\C:\Documents and Settings\Nick\Desktop\dragonz\DragonZ.sys
    S3 IlvMoneyDRIVER53;IlvMoneyDRIVER53;\??\C:\Documents and Settings\Nick\Desktop\iLove HackPack\iLove HackPack\MoonLight_Engine_1083.3\IlvMoney1083.sys
    .
    Contents of the 'Scheduled Tasks' folder
    "2007-10-06 13:24:57 C:\WINDOWS\Tasks\Norton AntiVirus - Scan my computer.job"
    "2007-10-12 21:39:50 C:\WINDOWS\Tasks\Norton SystemWorks One Button Checkup.job"
    "2007-11-18 08:30:01 C:\WINDOWS\Tasks\RegSweep Scheduled Scan.job"
    - C:\Program Files\RegSweep\RegSweep.exe
    "2007-11-18 10:11:43 C:\WINDOWS\Tasks\Symantec NetDetect.job"
    .
    **************************************************************************
    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-18 05:11:48
    Windows 5.1.2600 Service Pack 2 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    .
    Completion time: 2007-11-18 5:14:38 - machine was rebooted
    C:\ComboFix2.txt ... 2007-11-17 07:49
    .
    --- E O F ---
  • edited November 2007
    And finally my Kaspersky log:(this took long...)
    <html>
    <head>
    <title>KASPERSKY ONLINE SCANNER REPORT</title>
    ****** http-equiv='Content-Type' content='text/html; charset=utf-8'>
    </head>
    <style>
    .pagetitle { font-size:20px; color:#FFFFFF; font-family: Arial, Geneva, sans-serif; }
    .text { font-size:11px; font-family: Arial, Geneva, sans-serif; }
    TD { font-size:11px; font-family: Arial, Geneva, sans-serif; }
    </style>
    <body>
    <table width='100%' height='110' border='0'>
    <tr height='30' align='center' bgcolor='#005447'>
    <td colspan='2' height='30' class='pagetitle'>
    <b>KASPERSKY ONLINE SCANNER REPORT</b>
    </td>
    </tr>
    <tr height='70'>
    <td colspan='2' height='70'>
    Sunday, November 18, 2007 7:36:20 AM<br>
    Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)<br>
    Kaspersky Online Scanner version: 5.0.98.0<br>
    Kaspersky Anti-Virus database last update: 19/11/2007<br>
    Kaspersky Anti-Virus database records: 461377<br>
    </td>
    </tr>
    <tr height='10'>
    <td colspan='2' height='10'>
    </td>
    </tr>
    </table>
    <table width='100%' height='145' border='0'>
    <tr height='20' bgcolor='#EFEBDE'>
    <td colspan='2' height='20'><b>Scan Settings</b></td>
    </tr>
    <tr height='15'>
    <td height='15' width='250'>Scan using the following antivirus database</td>
    <td>extended</td>
    </tr>
    <tr height='15'>
    <td height='15'>Scan Archives</td>
    <td>true</td>
    </tr>
    <tr height='15'>
    <td height='15'>Scan Mail Bases</td>
    <td>true</td>
    </tr>
    <tr height='10'>
    <td colspan='2' height='10'>
    </td>
    </tr>
    <tr height='20' bgcolor='#EFEBDE'>
    <td height='20'><b>Scan Target</b></td>
    <td>My Computer</td>
    </tr>
    <tr height='20'>
    <td colspan='2' height='20'>
    A:\<br>
    C:\<br>
    D:\<br>
    E:\
    </td>
    </tr>
    <tr height='10'>
    <td colspan='2' height='10'>
    </td>
    </tr>
    <tr height='20' bgcolor='#EFEBDE'>
    <td colspan='2' height='20'><b>Scan Statistics</b></td>
    </tr>
    <tr height='15'>
    <td height='15'>Total number of scanned objects</td>
    <td>71525</td>
    </tr>
    <tr height='15'>
    <td height='15'>Number of viruses found</td>
    <td>29</td>
    </tr>
    <tr height='15'>
    <td height='15'>Number of infected objects</td>
    <td>112</td>
    </tr>
    <tr height='15'>
    <td height='15'>Number of suspicious objects</td>
    <td>6</td>
    </tr>
    <tr height='15'>
    <td height='15'>Duration of the scan process</td>
    <td>01:50:37</td>
    </tr>
    </table>
    <br>
    <table width='100%' border='0'>
    <tr height='20' bgcolor='#EFEBDE'>
    <td height='20'><b>Infected Object Name</b></td>
    <td width='200'><b>Virus Name</b></td>
    <td width='100'><b>Last Action</b></td>
    </tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\Cookies\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\NTUSER.DAT </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\LocalService\ntuser.dat.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\Cookies\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\NTUSER.DAT </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\NetworkService\ntuser.dat.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Cookies\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\History\History.IE5\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\History\History.IE5\MSHist012007111820071119\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\Temp\flaE.tmp </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\Temporary Internet Files\Content.IE5\index.dat </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\Local Settings\Temporary Internet Files\Content.IE5\MNS1K50T\get_video[1] </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\NTUSER.DAT </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Documents and Settings\Nick\ntuser.dat.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe </td>
    <td>Infected: Trojan.Win32.Patched.af </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Program Files\D-Link\AirPlus G\AirGCFG.exe </td>
    <td>Infected: Trojan.Win32.Patched.af </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Program Files\mIRC\mirc.exe </td>
    <td>Infected: not-a-virus:Client-IRC.Win32.mIRC.63 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapw32.exe </td>
    <td>Infected: Trojan.Win32.Patched.af </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\MountPointManagerRemoteDatabase </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP26\A0186853.exe </td>
    <td>Infected: not-a-virus:RiskTool.Win32.Reboot.f </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP32\A0224989.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Firu.h </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP35\A0257033.exe/stream/data0001/stream/data0014 </td>
    <td>Infected: not-a-virus:Client-IRC.Win32.mIRC.63 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP35\A0257033.exe/stream/data0001/stream </td>
    <td>Infected: not-a-virus:Client-IRC.Win32.mIRC.63 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP35\A0257033.exe/stream/data0001 </td>
    <td>Infected: not-a-virus:Client-IRC.Win32.mIRC.63 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP35\A0257033.exe/stream </td>
    <td>Infected: not-a-virus:Client-IRC.Win32.mIRC.63 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP35\A0257033.exe </td>
    <td>NSIS: infected - 4 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0306112.exe </td>
    <td>Infected: Trojan-Dropper.Win32.Agent.cgq </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0309087.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.agh </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0320087.dll </td>
    <td>Infected: Trojan.Win32.BHO.rf </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0320101.old </td>
    <td>Infected: not-a-virus:FraudTool.Win32.BestSeller.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0320104.old </td>
    <td>Infected: not-a-virus:FraudTool.Win32.BestSeller.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0320111.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.TTC.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0321040.sys </td>
    <td>Infected: not-a-virus:FraudTool.Win32.BestSeller.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0321041.sys </td>
    <td>Infected: not-a-virus:FraudTool.Win32.BestSeller.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0321054.exe </td>
    <td>Infected: not-a-virus:FraudTool.Win32.BestSeller.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0322100.dll </td>
    <td>Infected: Trojan-Downloader.Win32.BHO.bo </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0327302.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Firu.h </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0329011.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.ZenoSearch.ad </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0329099.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.PurityScan.gl </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0329105.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Small.gon </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0329106.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Small.goz </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0358290.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0367290.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374290.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374298.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Agent.ezc </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374384.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374393.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Small.gll </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374394.exe/data0002 </td>
    <td>Infected: not-a-virus:AdWare.Win32.TTC.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374394.exe </td>
    <td>NSIS: infected - 1 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374399.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Agent.ezc </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP39\A0374405.dll </td>
    <td>Infected: not-virus:Hoax.Win32.Renos.lq </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375421.exe </td>
    <td>Infected: Trojan.Win32.Agent.bck </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375422.exe </td>
    <td>Infected: Trojan.Win32.Agent.bck </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375423.exe </td>
    <td>Infected: Trojan.Win32.Agent.bck </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375424.exe </td>
    <td>Infected: Trojan.Win32.Agent.bck </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375425.exe </td>
    <td>Infected: Trojan.Win32.Agent.bck </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375426.exe </td>
    <td>Infected: Trojan.Win32.Agent.bck </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375436.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aqn </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP40\A0375439.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376439.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376569.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Agent.ezc </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376572.EXE/data0002 </td>
    <td>Infected: not-a-virus:AdWare.Win32.TTC.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376572.EXE </td>
    <td>NSIS: infected - 1 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376582.dll </td>
    <td>Infected: not-virus:Hoax.Win32.Renos.lq </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0376584.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Small.gll </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0380439.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0381391.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP41\A0382100.exe </td>
    <td>Infected: Trojan-Downloader.Win32.VB.bsp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP42\A0383731.EXE </td>
    <td>Suspicious: Packed.Win32.CryptExe </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384429.exe </td>
    <td>Infected: Trojan-Downloader.Win32.VB.bto </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384430.exe </td>
    <td>Infected: not-a-virus:AdWare.Win32.TTC.c </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384433.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384434.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.BHO.gw </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384435.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384436.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384437.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384438.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384439.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.ahr </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384440.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384442.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384444.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384445.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384446.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384448.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384449.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384450.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384451.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384452.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.ahr </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384453.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aju </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384455.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384456.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384457.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384460.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.BHO.gw </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384461.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384462.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384463.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aqr </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384464.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384465.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384466.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384467.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384468.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384469.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384471.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384472.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384473.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.BHO.gw </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384474.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384475.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384477.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384478.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384479.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384480.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384481.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384482.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384484.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384485.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384486.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384487.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aju </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384488.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384489.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0384490.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0385488.exe </td>
    <td>Infected: not-a-virus:RiskTool.Win32.Reboot.f </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0385942.exe </td>
    <td>Suspicious: Packed.Win32.CryptExe </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP44\A0385946.exe </td>
    <td>Suspicious: Packed.Win32.CryptExe </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387419.exe </td>
    <td>Infected: Trojan-Downloader.Win32.Small.gll </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387420.exe/data0002 </td>
    <td>Infected: not-a-virus:AdWare.Win32.TTC.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387420.exe </td>
    <td>NSIS: infected - 1 </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387421.exe </td>
    <td>Infected: Trojan.Win32.Obfuscated.kp </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387422.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.Virtumonde.aps </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0387423.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.BHO.gw </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0393917.EXE </td>
    <td>Suspicious: Packed.Win32.CryptExe </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0393921.exe </td>
    <td>Suspicious: Packed.Win32.CryptExe </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP45\A0393925.EXE </td>
    <td>Suspicious: Packed.Win32.CryptExe </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP46\A0393931.dll </td>
    <td>Infected: not-a-virus:AdWare.Win32.TTC.a </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\System Volume Information\_restore{912EBDD2-2840-4C0F-8864-F83BC47423CC}\RP46\change.log </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\Debug\PASSWD.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\SchedLgU.Txt </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\SoftwareDistribution\ReportingEvents.log </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\CatRoot2\edb.log </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\CatRoot2\tmp.edb </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\AppEvent.Evt </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\default </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\default.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\SAM </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\SAM.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\SecEvent.Evt </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\SECURITY </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\SECURITY.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\software </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\software.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\SysEvent.Evt </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\system </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\config\system.LOG </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\h323log.txt </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td height='20'>C:\WINDOWS\WindowsUpdate.log </td>
    <td>Object is locked </td>
    <td>skipped </td>
    </tr>
    <tr><td colspan='3' height='1' bgcolor='#EFEBDE'></td></tr>
    <tr height='20'>
    <td colspan='3' height='20'><b>Scan process completed.</b></td>
    </tr>
    </table>
    </body>
    </html>

    i dunno why its like this
  • edited November 2007
    Hi jinlord
    Logs, looks good but let's run one online scan to be sure:



    Run Eset NOD32 Online AntiVirus

    Note: You will need to use Internet Explorer for this scan.
    • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
    • When asked, allow the activex control to install
    • Disable your current Antivirus software. You can usually do this with its Notfication Tray icon near the clock.
    • Click Start
    • Make sure that the option "Remove found threats" is Un-checked, and the option "Scan unwanted applications" is checked
    • Click Scan
    • Wait for the scan to finish
    • Re-enable your Anvirisus software.
    • A logfile is created and located at C:\Program Files\EsetOnlineScanner\log.txt. Please include this on your post.
  • edited November 2007
    here it is:

    # version=4
    # OnlineScanner.ocx=1.0.0.56
    # OnlineScannerDLLA.dll=1, 0, 0, 51
    # OnlineScannerDLLW.dll=1, 0, 0, 51
    # OnlineScannerUninstaller.exe=1, 0, 0, 49
    # vers_standard_module=2673 (20071120)
    # vers_arch_module=1.059 (20071108)
    # vers_adv_heur_module=1.064 (20070717)
    # EOSSerial=f6c23f123ee7fa4788a44dee2bb5b51c
    # end=finished
    # remove_checked=false
    # unwanted_checked=true
    # utc_time=2007-11-20 09:07:01
    # local_time=2007-11-20 04:07:01 (-0500, Eastern Standard Time)
    # country="Canada"
    # osver=5.1.2600 NT Service Pack 2
    # scanned=66910
    # found=3
    # scan_time=2109
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe Win32/Agent.AB virus 00000000000000000000000000000000
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe Win32/Agent.AB virus 00000000000000000000000000000000
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapw32.exe Win32/Agent.AB virus 00000000000000000000000000000000
  • edited November 2007
    Hi
    Download WinPFind3U.exe to your Desktop and double-click on it to extract the files.
    It will create a folder named WinPFind3u on your desktop.

    Close ALL OTHER PROGRAMS.
    Open the WinPFind3u folder and double-click on WinPFind3U.exe to start the program.

    Change settings Under Files/Folders Created Within
    * Click on 60 days
    Change settings Under Files/Folders Modified Within
    * Click on 60 days

    Next on the right side of screen Under Additional Scans
    * Put a checkmark in the box next to Reg-ControlSets
    * Put a checkmark in the box next to Reg-File Associations
    * Put a checkmark in the box next to Reg-Security Settings

    Now click the Run Scan button on the toolbar.
    The program will be scanning huge amounts of data so depending on your system it could take a long time to complete. Let it run unhindered until it finishes.
    When the scan is complete Notepad will open with the report file loaded in it.
    Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.

    Use the Add Reply button and Copy/Paste the information back here. I will review it when it comes in.
    If, after posting, the last line is not < End of Report > then the log is too big to fit into a single post and you will need to split it into multiple posts.
  • edited November 2007
    WinPFind3 logfile created on: 21/11/2007 4:13:54 AM
    WinPFind3U by OldTimer - Version 1.0.43 Folder = C:\Documents and Settings\Nick\Desktop\WinPFind3u\
    Microsoft Windows XP Service Pack 2 (Version = 5.1.2600)
    Internet Explorer (Version = 6.0.2900.2180)

    511.48 Mb Total Physical Memory | 250.30 Mb Available Physical Memory | 48.94% Memory free
    3.59 Gb Paging File | 3.36 Gb Available in Paging File | 93.45% Paging File free
    Paging file location(s): C:\pagefile.sys 3200 3972;

    %SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
    Drive C: | 149.04 Gb Total Space | 125.38 Gb Free Space | 84.13% Space Free
    D: Drive not present or media not loaded
    E: Drive not present or media not loaded
    F: Drive not present or media not loaded
    Computer Name: PC
    Current User Name: Nick
    Logged in as Administrator.
    Current Boot Mode: Normal

    [Processes - Non-Microsoft Only]
    airgcfg.exe -> %ProgramFiles%\D-Link\AirPlus G\AirGCFG.exe -> D-Link [Ver = 3, 3, 0, 41119 | Size = 1224704 bytes | Modified Date = 19/11/2004 8:15:10 AM | Attr = ]
    avgas.exe -> %ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5\avgas.exe -> GRISOFT s.r.o. [Ver = 7, 5, 1, 43 | Size = 6731312 bytes | Modified Date = 11/06/2007 4:25:42 AM | Attr = ]
    guard.exe -> %ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5\guard.exe -> GRISOFT s.r.o. [Ver = 7, 5, 1, 22 | Size = 312880 bytes | Modified Date = 30/05/2007 7:31:10 AM | Attr = ]
    mixer.exe -> %SystemRoot%\mixer.exe -> C-Media Electronic Inc. (www.cmedia.com.tw) [Ver = 1.53 | Size = 1495040 bytes | Modified Date = 12/06/2002 2:23:54 AM | Attr = ]
    navapsvc.exe -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\Navapsvc.exe -> Symantec Corporation [Ver = 8.00.58 | Size = 115792 bytes | Modified Date = 16/08/2001 5:16:12 PM | Attr = ]
    navapw32.exe -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\navapw32.exe -> Symantec Corporation [Ver = 8.00.58 | Size = 83024 bytes | Modified Date = 16/08/2001 4:52:42 PM | Attr = ]
    nopdb.exe -> %ProgramFiles%\Norton SystemWorks\Speed Disk\NOPDB.EXE -> Symantec Corporation [Ver = 6.0.0.20 | Size = 176161 bytes | Modified Date = 09/08/2001 5:00:00 AM | Attr = ]
    nprotect.exe -> %ProgramFiles%\Norton SystemWorks\Norton Utilities\NPROTECT.EXE -> Symantec Corporation [Ver = 15.0.0.20 | Size = 135168 bytes | Modified Date = 10/08/2001 5:00:00 AM | Attr = ]
    winpfind3u.exe -> %UserDesktop%\WinPFind3u\WinPFind3U.exe -> OldTimer Tools [Ver = 1.0.43.0 | Size = 371200 bytes | Modified Date = 18/11/2007 4:22:40 PM | Attr = ]
    wzcsldr2.exe -> %ProgramFiles%\ANI\ANIWZCS2 Service\WZCSLDR2.exe -> Alpha Networks Inc. [Ver = 1, 0, 4, 40414 | Size = 53248 bytes | Modified Date = 22/10/2004 12:42:44 PM | Attr = ]
    [Win32 Services - Non-Microsoft Only]
    (ANIWZCSdService) ANIWZCSd Service [Win32_Shared | Auto | Stopped] -> %ProgramFiles%\ANI\ANIWZCS2 Service\ANIWZCSdS.exe -> Alpha Networks Inc. [Ver = 1, 0, 1, 30507 | Size = 49152 bytes | Modified Date = 22/10/2004 12:42:44 PM | Attr = ]
    (AVG Anti-Spyware Guard) AVG Anti-Spyware Guard [Win32_Own | Auto | Running] -> %ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5\guard.exe -> GRISOFT s.r.o. [Ver = 7, 5, 1, 22 | Size = 312880 bytes | Modified Date = 30/05/2007 7:31:10 AM | Attr = ]
    (dmadmin) Logical Disk Manager Administrative Service [Win32_Shared | On_Demand | Stopped] -> %System32%\dmadmin.exe -> Microsoft Corp., Veritas Software [Ver = 2600.2180.503.0 | Size = 224768 bytes | Modified Date = 04/08/2004 2:56:50 AM | Attr = ]
    (FLEXnet Licensing Service) FLEXnet Licensing Service [Win32_Own | On_Demand | Stopped] -> %CommonProgramFiles%\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe -> Macrovision Europe Ltd. [Ver = 11.03.005 | Size = 654848 bytes | Modified Date = 12/10/2007 2:43:06 PM | Attr = ]
    (navapsvc) Norton AntiVirus Auto Protect Service [Win32_Own | Auto | Running] -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\Navapsvc.exe -> Symantec Corporation [Ver = 8.00.58 | Size = 115792 bytes | Modified Date = 16/08/2001 5:16:12 PM | Attr = ]
    (NProtectService) Norton Unerase Protection [Win32_Own | Auto | Running] -> %ProgramFiles%\Norton SystemWorks\Norton Utilities\NPROTECT.EXE -> Symantec Corporation [Ver = 15.0.0.20 | Size = 135168 bytes | Modified Date = 10/08/2001 5:00:00 AM | Attr = ]
    (SBService) ScriptBlocking Service [Win32_Own | Auto | Stopped] -> %CommonProgramFiles%\Symantec Shared\Script Blocking\SBServ.exe -> Symantec Corporation [Ver = 1, 1, 0, 126 | Size = 54408 bytes | Modified Date = 13/08/2001 10:18:36 PM | Attr = ]
    (Speed Disk service) Speed Disk service [Win32_Own | Auto | Running] -> %ProgramFiles%\Norton SystemWorks\Speed Disk\NOPDB.EXE -> Symantec Corporation [Ver = 6.0.0.20 | Size = 176161 bytes | Modified Date = 09/08/2001 5:00:00 AM | Attr = ]
    [Registry - Non-Microsoft Only]
    < Run [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ->
    !AVG Anti-Spyware -> %ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5\avgas.exe -> GRISOFT s.r.o. [Ver = 7, 5, 1, 43 | Size = 6731312 bytes | Modified Date = 11/06/2007 4:25:42 AM | Attr = ]
    ANIWZCS2Service -> %ProgramFiles%\ANI\ANIWZCS2 Service\WZCSLDR2.exe -> Alpha Networks Inc. [Ver = 1, 0, 4, 40414 | Size = 53248 bytes | Modified Date = 22/10/2004 12:42:44 PM | Attr = ]
    C-Media Mixer -> %SystemRoot%\mixer.exe -> C-Media Electronic Inc. (www.cmedia.com.tw) [Ver = 1.53 | Size = 1495040 bytes | Modified Date = 12/06/2002 2:23:54 AM | Attr = ]
    D-Link AirPlus G -> %ProgramFiles%\D-Link\AirPlus G\AirGCFG.exe -> D-Link [Ver = 3, 3, 0, 41119 | Size = 1224704 bytes | Modified Date = 19/11/2004 8:15:10 AM | Attr = ]
    MSPY2002 -> %System32%\IME\PINTLGNT\IMSCINST.EXE -> [Ver = | Size = 59392 bytes | Modified Date = 04/08/2004 12:31:50 AM | Attr = ]
    NAV Agent -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\navapw32.exe -> Symantec Corporation [Ver = 8.00.58 | Size = 83024 bytes | Modified Date = 16/08/2001 4:52:42 PM | Attr = ]
    < ShellExecuteHooks [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks ->
    {57B86673-276A-48B2-BAE7-C6DBB3020EB8} [HKLM] -> %ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5\shellexecutehook.dll [AVG Anti-Spyware 7.5] -> GRISOFT s.r.o. [Ver = 7, 5, 1, 36 | Size = 79408 bytes | Modified Date = 30/05/2007 7:29:58 AM | Attr = ]
    < SecurityProviders [HKLM] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\\SecurityProviders ->
    < Winlogon settings [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ->
    < Winlogon settings [HKCU] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ->
    < CurrentVersion Policy Settings [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ActiveDesktop\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveAutoRun -> 67108863 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun -> 255 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\NonEnum\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\NonEnum\\{BDEADF00-C265-11D0-BCED-00A0C90AB50F} -> 1 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\NonEnum\\{6DFD7C5C-2451-11d3-A299-00C04F8EF6AF} -> 1073741857 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\NonEnum\\{0DF44EAA-FF21-4412-828E-260A8728E7F1} -> 32 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\\dontdisplaylastusername -> 0 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\\legalnoticecaption -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\\legalnoticetext -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\\shutdownwithoutlogon -> 1 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\\undockwithoutlogon -> 1 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Uninstall\ -> ->
    < CurrentVersion Policy Settings [HKCU] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ -> ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ActiveDesktop\ -> ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Associations\ -> ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ -> ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun -> 145 ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\ -> ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\ -> ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\DisableRegistryTools -> 0 ->
    < HOSTS File > (27 bytes) -> C:\WINDOWS\System32\drivers\etc\Hosts ->
    127.0.0.1 localhost -> ->
    < Internet Explorer Settings > -> ->
    HKLM: Default_Page_URL -> http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome ->
    HKLM: Main\\Default_Search_URL -> http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch ->
    HKLM: Local Page -> C:\windows\system32\blank.htm ->
    HKLM: Search Page -> http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch ->
    HKLM: Start Page -> http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home ->
    HKLM: CustomizeSearch -> http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm ->
    HKLM: Search\\Default_Search_URL -> http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch ->
    HKLM: SearchAssistant -> http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm ->
    HKCU: Default_Search_URL -> http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch ->
    HKCU: Local Page -> C:\windows\system32\blank.htm ->
    HKCU: Search Page -> http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch ->
    HKCU: Start Page -> http://yahoo.com/ ->
    HKCU: ProxyEnable -> 0 ->
    HKCU: ProxyOverride -> *.local ->
    < Trusted Sites > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ ->
    click_getmirar.com [https] -> ->
    click_mirarsearch.com [https] -> ->
    redirect_mirarsearch.com [https] -> ->
    msn.com [ - ] -> ->
    awbeta_net-nucleus.com [https] -> ->
    < BHO's > -> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ ->
    {BDF3E430-B101-42AD-A544-FADC6B084872} [HKLM] -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\NAVShExt.dll [CNavExtBho Class] -> Symantec Corporation [Ver = 8.00.58 | Size = 102400 bytes | Modified Date = 16/08/2001 3:35:10 PM | Attr = ]
    < Internet Explorer ToolBars [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ToolBar ->
    {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} [HKLM] -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\NAVShExt.dll [Norton AntiVirus] -> Symantec Corporation [Ver = 8.00.58 | Size = 102400 bytes | Modified Date = 16/08/2001 3:35:10 PM | Attr = ]
    < Internet Explorer ToolBars [HKCU] > -> HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\ ->
    WebBrowser\\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} [HKLM] -> %ProgramFiles%\Norton SystemWorks\Norton AntiVirus\NAVShExt.dll [Norton AntiVirus] -> Symantec Corporation [Ver = 8.00.58 | Size = 102400 bytes | Modified Date = 16/08/2001 3:35:10 PM | Attr = ]
    WebBrowser\\{9A9C9B68-F908-4AAB-8D0C-10EA8997F37E} [HKLM] -> Reg Data - Key not found [Reg Data - Key not found] -> File not found
    < User Agent Post Platform [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform ->
    SV1 -> ->
    < DNS Name Servers [HKLM] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Adapters\ ->
    {43DA43CE-33BC-4101-B66A-9A61DEB3FF9C} -> (D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2)) ->
    {6013B2D2-B0E7-4DDF-89F2-E7EADFE88DDF} -> (D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2)) ->
    {610B1665-BD37-4571-9E01-D685CF55FD23} -> (D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2)) ->
    {911AD1F8-2BE7-4817-86D2-B667F0C87355} -> (D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2)) ->
    {ADCFC62C-1C93-4990-9884-BC59CF2B2752} -> (D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2)) ->
    {D4E81A21-1D87-4F40-B300-0F11B6E82E5A} -> (VIA Compatable Fast Ethernet Adapter) ->
    {E9788ECE-4A5A-4C2A-825D-9A6D8F63D892} -> (D-Link AirPlus G DWL-G122 Wireless USB Adapter(rev.A2)) ->
    < Protocol Handlers [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\ ->
    ipp -> Reg Data - Key not found -> File not found
    msdaipp -> Reg Data - Key not found -> File not found
    < Downloaded Program Files > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\ ->
    {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} -> CKAVWebScan Object - CodeBase = http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab ->
    {166B1BCA-3F9C-11CF-8075-444553540000} -> Shockwave ActiveX Control - CodeBase = http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab ->
    {17492023-C23A-453E-A040-C7C580BBF700} -> Windows Genuine Advantage Validation Tool - CodeBase = http://go.microsoft.com/fwlink/?linkid=39204 ->
    {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} -> - CodeBase = http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.2.100.cab ->
    {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} -> OnlineScanner Control - CodeBase = http://www.eset.eu/buxus/docs/OnlineScanner.cab ->
    {5F5F9FB8-878E-4455-95E0-F64B2314288A} -> ijjiPlugin2 Class - CodeBase = http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin11USA.cab ->
    {67DABFBF-D0AB-41FA-9C46-CC0F21721616} -> - CodeBase = http://go.divx.com/plugin/DivXBrowserPlugin.cab ->
    {CD995117-98E5-4169-9920-6C12D4C0B548} -> HGPlugin9USA Class - CodeBase = http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab ->
    {D27CDB6E-AE6D-11CF-96B8-444553540000} -> - CodeBase = http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab ->
    {DD583921-A9E9-4FBF-9266-8DC2AB5EA0AF} -> HGPlugin10USA Class - CodeBase = http://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin10USA.cab ->

    [Registry - Additional Scans - Non-Microsoft Only]
    < ControlSets > -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\Select\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\Select\\Current -> 2 ->
    HKEY_LOCAL_MACHINE\SYSTEM\Select\\Default -> 2 ->
    HKEY_LOCAL_MACHINE\SYSTEM\Select\\Failed -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\Select\\LastKnownGood -> 3 ->
    < File Associations - Select to Repair > -> HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>\ ->
    .bat [@ = batfile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .chm [@ = chm.file] -> PersistentHandler = Reg Data - Key not found ->
    .cmd [@ = cmdfile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .com [@ = comfile] -> PersistentHandler = {098f2470-bae0-11cd-b579-08002b30bfeb} ->
    .cpl [@ = cplfile] -> PersistentHandler = {098f2470-bae0-11cd-b579-08002b30bfeb} ->
    .exe [@ = exefile] -> PersistentHandler = {098f2470-bae0-11cd-b579-08002b30bfeb} ->
    .hlp [@ = hlpfile] -> PersistentHandler = Reg Data - Key not found ->
    .hta [@ = htafile] -> PersistentHandler = Reg Data - Key not found ->
    .html [@ = FirefoxHTML] -> PersistentHandler = {eec97550-47a9-11cf-b952-00aa0051fe20} ->
    .inf [@ = inffile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .ini [@ = inifile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .url [@ = InternetShortcut] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .js [@ = JSFile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .jse [@ = JSEFile] -> PersistentHandler = Reg Data - Key not found ->
    .pif [@ = piffile] -> PersistentHandler = Reg Data - Key not found ->
    .reg [@ = regfile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .scr [@ = scrfile] -> PersistentHandler = Reg Data - Key not found ->
    .txt [@ = txtfile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .vbe [@ = VBEFile] -> PersistentHandler = Reg Data - Key not found ->
    .vbs [@ = VBSFile] -> PersistentHandler = {5e941d80-bf96-11cd-b579-08002b30bfeb} ->
    .wsf [@ = WSFFile] -> PersistentHandler = Reg Data - Key not found ->
    .wsh [@ = WSHFile] -> PersistentHandler = Reg Data - Key not found ->
    < Security Settings > -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\\AntiVirusDisableNotify -> 0 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\\FirewallDisableNotify -> 0 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\\UpdatesDisableNotify -> 0 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\\AntiVirusOverride -> 0 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\\FirewallOverride -> 0 ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall\ -> ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\Type -> 32 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\Start -> 3 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\ErrorControl -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\ImagePath -> %SystemRoot%\system32\svchost.exe -k netsvcs ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\DisplayName -> Background Intelligent Transfer Service ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\DependOnService -> RpcSs; ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\DependOnGroup -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\ObjectName -> LocalSystem ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\Description -> Transfers data between clients and servers in the background. If BITS is disabled, features such as Windows Update will not work correctly. ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\\FailureActions ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Parameters\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Parameters\\ServiceDll -> C:\WINDOWS\system32\qmgr.dll ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Security\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Security\\Security ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Enum\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Enum\\0 -> Root\LEGACY_BITS\0000 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Enum\\Count -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS\Enum\\NextInstance -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\DependOnGroup -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\DependOnService -> Netman;WinMgmt; ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\Description -> Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small office network. ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\DisplayName -> Windows Firewall/Internet Connection Sharing (ICS) ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\ErrorControl -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\ImagePath -> %SystemRoot%\System32\svchost.exe -k netsvcs ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\ObjectName -> LocalSystem ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\Start -> 2 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\\Type -> 32 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch\\Epoch -> 6402 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\\ServiceDll -> %SystemRoot%\System32\ipnathlp.dll ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\\EnableFirewall -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\\DoNotAllowExceptions -> 0 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\\DisableNotifications -> 0 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Program Files\mIRC\mirc.exe -> C:\Program Files\mIRC\mirc.exe:*:Enabled:mIRC ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Nexon\MapleStory\MapleStory.exe -> C:\Nexon\MapleStory\MapleStory.exe:*:Disabled:MapleStory ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Program Files\MSN Messenger\msnmsgr.exe -> C:\Program Files\MSN Messenger\msnmsgr.exe:*:Enabled:Messenger ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\139:TCP -> 139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\445:TCP -> 445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\137:UDP -> 137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\138:UDP -> 138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\1900:UDP -> 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\2869:TCP -> 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Setup\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Setup\\ServiceUpgrade -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Setup\InterfacesUnfirewalledAtUpdate\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Setup\InterfacesUnfirewalledAtUpdate\\All -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Enum\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Enum\\0 -> Root\LEGACY_SHAREDACCESS\0000 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Enum\\Count -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Enum\\NextInstance -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\Type -> 32 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\Start -> 2 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\ErrorControl -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\ImagePath -> %systemroot%\system32\svchost.exe -k netsvcs ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\DisplayName -> Automatic Updates ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\ObjectName -> LocalSystem ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\\Description -> Enables the download and installation of Windows updates. If this service is disabled, this computer will not be able to use the Automatic Updates feature or the Windows Update Web site. ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Parameters\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Parameters\\ServiceDll -> C:\WINDOWS\system32\wuauserv.dll ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Security\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Security\\Security ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Enum\ -> ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Enum\\0 -> Root\LEGACY_WUAUSERV\0000 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Enum\\Count -> 1 ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Enum\\NextInstance -> 1 ->
  • edited November 2007
    [Files/Folders - Created Within 60 days]
    Config.Msi -> %SystemDrive%\Config.Msi -> [Folder | Created Date = 17/11/2007 10:57:51 AM | Attr = HS]
    hiberfil.sys -> %SystemDrive%\hiberfil.sys -> [Ver = | Size = 536399872 bytes | Created Date = 01/01/1601 5:00:00 AM | Attr = HS]
    Nexon -> %SystemDrive%\Nexon -> [Folder | Created Date = 04/10/2007 2:40:12 PM | Attr = ]
    qoobox -> %SystemDrive%\qoobox -> [Folder | Created Date = 18/11/2007 5:09:24 AM | Attr = ]
    sqmdata18.sqm -> %SystemDrive%\sqmdata18.sqm -> [Ver = | Size = 268 bytes | Created Date = 23/09/2007 9:17:00 AM | Attr = H ]
    sqmdata19.sqm -> %SystemDrive%\sqmdata19.sqm -> [Ver = | Size = 268 bytes | Created Date = 23/09/2007 12:02:47 PM | Attr = H ]
    sqmnoopt18.sqm -> %SystemDrive%\sqmnoopt18.sqm -> [Ver = | Size = 244 bytes | Created Date = 23/09/2007 9:17:00 AM | Attr = H ]
    sqmnoopt19.sqm -> %SystemDrive%\sqmnoopt19.sqm -> [Ver = | Size = 244 bytes | Created Date = 23/09/2007 12:02:47 PM | Attr = H ]
    catchme.exe -> %SystemRoot%\catchme.exe -> [Ver = | Size = 136192 bytes | Created Date = 15/11/2007 4:16:45 PM | Attr = ]
    erdnt -> %SystemRoot%\erdnt -> [Folder | Created Date = 15/11/2007 4:29:22 PM | Attr = ]
    ERUNT -> %SystemRoot%\ERUNT -> [Folder | Created Date = 15/11/2007 3:48:07 PM | Attr = ]
    msettings.ini -> %SystemRoot%\msettings.ini -> [Ver = | Size = 21227 bytes | Created Date = 10/11/2007 5:36:50 PM | Attr = ]
    NirCmd.exe -> %SystemRoot%\NirCmd.exe -> NirSoft [Ver = 2.00 | Size = 51200 bytes | Created Date = 15/11/2007 4:16:45 PM | Attr = ]
    TEMP -> %SystemRoot%\TEMP -> [Folder | Created Date = 18/11/2007 5:14:47 AM | Attr = ]
    bbesokwu.ini -> %System32%\bbesokwu.ini -> [Ver = | Size = 982511 bytes | Created Date = 15/11/2007 4:53:20 AM | Attr = HS]
    cqnpvvcu.ini -> %System32%\cqnpvvcu.ini -> [Ver = | Size = 678100 bytes | Created Date = 16/11/2007 9:41:26 PM | Attr = HS]
    dbkyxrru.ini -> %System32%\dbkyxrru.ini -> [Ver = | Size = 537469 bytes | Created Date = 04/11/2007 9:49:26 AM | Attr = HS]
    ddnktgfk.ini -> %System32%\ddnktgfk.ini -> [Ver = | Size = 967822 bytes | Created Date = 16/11/2007 3:20:40 AM | Attr = HS]
    dqvrovni.ini -> %System32%\dqvrovni.ini -> [Ver = | Size = 585214 bytes | Created Date = 10/11/2007 5:24:08 PM | Attr = HS]
    dsfkxbxm.ini -> %System32%\dsfkxbxm.ini -> [Ver = | Size = 579438 bytes | Created Date = 31/10/2007 3:21:39 PM | Attr = HS]
    dwfokvjc.ini -> %System32%\dwfokvjc.ini -> [Ver = | Size = 677980 bytes | Created Date = 16/11/2007 5:50:54 AM | Attr = HS]
    ecxebjmi.ini -> %System32%\ecxebjmi.ini -> [Ver = | Size = 585436 bytes | Created Date = 11/11/2007 2:12:04 PM | Attr = HS]
    gkiuqspp.ini -> %System32%\gkiuqspp.ini -> [Ver = | Size = 1225292 bytes | Created Date = 15/11/2007 4:04:21 PM | Attr = HS]
    hcfdpjnr.ini -> %System32%\hcfdpjnr.ini -> [Ver = | Size = 583166 bytes | Created Date = 12/11/2007 9:37:08 AM | Attr = HS]
    hhovrsxq.ini -> %System32%\hhovrsxq.ini -> [Ver = | Size = 585316 bytes | Created Date = 11/11/2007 10:51:23 AM | Attr = HS]
    instdump.dmp -> %System32%\instdump.dmp -> [Ver = | Size = 86857 bytes | Created Date = 15/11/2007 3:30:33 PM | Attr = ]
    instdump.zip -> %System32%\instdump.zip -> [Ver = | Size = 16324 bytes | Created Date = 15/11/2007 3:30:35 PM | Attr = ]
    itlhywbg.ini -> %System32%\itlhywbg.ini -> [Ver = | Size = 584836 bytes | Created Date = 10/11/2007 12:26:33 PM | Attr = HS]
    Kaspersky Lab -> %System32%\Kaspersky Lab -> [Folder | Created Date = 18/11/2007 5:17:51 AM | Attr = ]
    kxbkryvr.ini -> %System32%\kxbkryvr.ini -> [Ver = | Size = 585616 bytes | Created Date = 11/11/2007 5:30:15 PM | Attr = HS]
    leatiraq.ini -> %System32%\leatiraq.ini -> [Ver = | Size = 671187 bytes | Created Date = 14/11/2007 3:20:23 PM | Attr = HS]
    lotlaluc.ini -> %System32%\lotlaluc.ini -> [Ver = | Size = 590836 bytes | Created Date = 12/11/2007 10:28:50 AM | Attr = HS]
    lpbhfxyk.ini -> %System32%\lpbhfxyk.ini -> [Ver = | Size = 591196 bytes | Created Date = 12/11/2007 8:07:43 PM | Attr = HS]
    lxbrhfps.ini -> %System32%\lxbrhfps.ini -> [Ver = | Size = 584596 bytes | Created Date = 09/11/2007 3:24:58 PM | Attr = HS]
    lycwdiyd.ini -> %System32%\lycwdiyd.ini -> [Ver = | Size = 584965 bytes | Created Date = 10/11/2007 12:42:37 PM | Attr = HS]
    mbpnebfm.ini -> %System32%\mbpnebfm.ini -> [Ver = | Size = 585076 bytes | Created Date = 10/11/2007 2:34:33 PM | Attr = HS]
    mqufbcvp.ini -> %System32%\mqufbcvp.ini -> [Ver = | Size = 669740 bytes | Created Date = 15/11/2007 3:21:18 PM | Attr = HS]
    nwkhsxrc.ini -> %System32%\nwkhsxrc.ini -> [Ver = | Size = 669053 bytes | Created Date = 13/11/2007 3:21:24 PM | Attr = HS]
    oucyvwav.ini -> %System32%\oucyvwav.ini -> [Ver = | Size = 591136 bytes | Created Date = 12/11/2007 12:43:52 PM | Attr = HS]
    pjeqpwsh.ini -> %System32%\pjeqpwsh.ini -> [Ver = | Size = 590956 bytes | Created Date = 12/11/2007 12:09:42 PM | Attr = HS]
    qqjpftxi.ini -> %System32%\qqjpftxi.ini -> [Ver = | Size = 669113 bytes | Created Date = 13/11/2007 6:17:28 PM | Attr = HS]
    rlpfkqto.ini -> %System32%\rlpfkqto.ini -> [Ver = | Size = 478974 bytes | Created Date = 07/11/2007 8:30:04 PM | Attr = HS]
    rlpfkqto.tmp -> %System32%\rlpfkqto.tmp -> [Ver = | Size = 478974 bytes | Created Date = 07/11/2007 9:09:21 PM | Attr = ]
    rnwrakxr.ini -> %System32%\rnwrakxr.ini -> [Ver = | Size = 487610 bytes | Created Date = 05/11/2007 5:01:00 PM | Attr = HS]
    swreg.exe -> %System32%\swreg.exe -> SteelWerX [Ver = 2.0.1.8 | Size = 279552 bytes | Created Date = 16/11/2007 9:48:33 PM | Attr = ]
    swsc.exe -> %System32%\swsc.exe -> SteelWerX [Ver = 2.0.0.0 | Size = 370688 bytes | Created Date = 16/11/2007 9:48:33 PM | Attr = ]
    swxcacls.exe -> %System32%\swxcacls.exe -> SteelWerX [Ver = 1.0.1.1 | Size = 212480 bytes | Created Date = 16/11/2007 9:48:33 PM | Attr = ]
    syvnivnd.ini -> %System32%\syvnivnd.ini -> [Ver = | Size = 549891 bytes | Created Date = 01/11/2007 2:22:50 PM | Attr = HS]
    tgbbnlro.ini -> %System32%\tgbbnlro.ini -> [Ver = | Size = 577678 bytes | Created Date = 30/10/2007 3:23:47 PM | Attr = HS]
    tgscbiwy.ini -> %System32%\tgscbiwy.ini -> [Ver = | Size = 671187 bytes | Created Date = 14/11/2007 5:21:47 PM | Attr = HS]
    tmirbebl.ini -> %System32%\tmirbebl.ini -> [Ver = | Size = 585616 bytes | Created Date = 11/11/2007 3:16:30 PM | Attr = HS]
    twosksuk.ini -> %System32%\twosksuk.ini -> [Ver = | Size = 590716 bytes | Created Date = 12/11/2007 10:04:01 AM | Attr = HS]
    upmyttrs.ini -> %System32%\upmyttrs.ini -> [Ver = | Size = 584476 bytes | Created Date = 08/11/2007 3:17:14 PM | Attr = HS]
    urcopqvc.ini -> %System32%\urcopqvc.ini -> [Ver = | Size = 584545 bytes | Created Date = 11/11/2007 6:06:16 PM | Attr = HS]
    vboglmqe.ini -> %System32%\vboglmqe.ini -> [Ver = | Size = 671247 bytes | Created Date = 14/11/2007 3:40:54 PM | Attr = HS]
    VFind.exe -> %System32%\VFind.exe -> [Ver = | Size = 49152 bytes | Created Date = 15/11/2007 4:16:43 PM | Attr = ]
    vuctgigm.ini -> %System32%\vuctgigm.ini -> [Ver = | Size = 540084 bytes | Created Date = 02/11/2007 3:21:06 PM | Attr = HS]
    wkdjtltq.ini -> %System32%\wkdjtltq.ini -> [Ver = | Size = 478854 bytes | Created Date = 07/11/2007 7:52:19 PM | Attr = HS]
    xvxrwwdk.ini -> %System32%\xvxrwwdk.ini -> [Ver = | Size = 671316 bytes | Created Date = 14/11/2007 8:15:24 PM | Attr = HS]
    yktmqmln.ini -> %System32%\yktmqmln.ini -> [Ver = | Size = 668993 bytes | Created Date = 13/11/2007 7:58:06 PM | Attr = HS]
    yrxytved.ini -> %System32%\yrxytved.ini -> [Ver = | Size = 678040 bytes | Created Date = 16/11/2007 5:50:56 AM | Attr = HS]
    yvsmwyap.ini -> %System32%\yvsmwyap.ini -> [Ver = | Size = 584743 bytes | Created Date = 10/11/2007 9:33:14 AM | Attr = HS]
    AvgAsCln.sys -> %System32%\drivers\AvgAsCln.sys -> GRISOFT, s.r.o. [Ver = 1.0.0.14 | Size = 10872 bytes | Created Date = 17/11/2007 7:55:00 AM | Attr = ]
    [Files/Folders - Modified Within 60 days]
    Config.Msi -> %SystemDrive%\Config.Msi -> [Folder | Modified Date = 18/11/2007 1:13:08 AM | Attr = HS]
    hiberfil.sys -> %SystemDrive%\hiberfil.sys -> [Ver = | Size = 536399872 bytes | Modified Date = 21/11/2007 3:54:00 AM | Attr = HS]
    Nexon -> %SystemDrive%\Nexon -> [Folder | Modified Date = 27/10/2007 6:09:58 PM | Attr = ]
    Program Files -> %ProgramFiles% -> [Folder | Modified Date = 19/11/2007 3:24:18 AM | Attr = R ]
    qoobox -> %SystemDrive%\qoobox -> [Folder | Modified Date = 18/11/2007 5:14:42 AM | Attr = ]
    sqmdata00.sqm -> %SystemDrive%\sqmdata00.sqm -> [Ver = | Size = 268 bytes | Modified Date = 14/11/2007 5:16:40 PM | Attr = H ]
    sqmdata01.sqm -> %SystemDrive%\sqmdata01.sqm -> [Ver = | Size = 268 bytes | Modified Date = 14/11/2007 8:13:20 PM | Attr = H ]
    sqmdata02.sqm -> %SystemDrive%\sqmdata02.sqm -> [Ver = | Size = 268 bytes | Modified Date = 15/11/2007 3:17:38 PM | Attr = H ]
    sqmdata03.sqm -> %SystemDrive%\sqmdata03.sqm -> [Ver = | Size = 268 bytes | Modified Date = 15/11/2007 4:03:26 PM | Attr = H ]
    sqmdata04.sqm -> %SystemDrive%\sqmdata04.sqm -> [Ver = | Size = 268 bytes | Modified Date = 15/11/2007 4:34:08 PM | Attr = H ]
    sqmdata05.sqm -> %SystemDrive%\sqmdata05.sqm -> [Ver = | Size = 268 bytes | Modified Date = 15/11/2007 7:13:04 PM | Attr = H ]
    sqmdata06.sqm -> %SystemDrive%\sqmdata06.sqm -> [Ver = | Size = 268 bytes | Modified Date = 16/11/2007 3:14:32 AM | Attr = H ]
    sqmdata07.sqm -> %SystemDrive%\sqmdata07.sqm -> [Ver = | Size = 268 bytes | Modified Date = 16/11/2007 5:20:36 AM | Attr = H ]
    sqmdata08.sqm -> %SystemDrive%\sqmdata08.sqm -> [Ver = | Size = 268 bytes | Modified Date = 16/11/2007 5:41:40 AM | Attr = H ]
    sqmdata09.sqm -> %SystemDrive%\sqmdata09.sqm -> [Ver = | Size = 268 bytes | Modified Date = 16/11/2007 6:21:18 AM | Attr = H ]
    sqmdata10.sqm -> %SystemDrive%\sqmdata10.sqm -> [Ver = | Size = 268 bytes | Modified Date = 16/11/2007 7:26:16 AM | Attr = H ]
    sqmdata11.sqm -> %SystemDrive%\sqmdata11.sqm -> [Ver = | Size = 268 bytes | Modified Date = 16/11/2007 9:38:54 PM | Attr = H ]
    sqmdata12.sqm -> %SystemDrive%\sqmdata12.sqm -> [Ver = | Size = 268 bytes | Modified Date = 17/11/2007 12:57:50 AM | Attr = H ]
    sqmdata13.sqm -> %SystemDrive%\sqmdata13.sqm -> [Ver = | Size = 268 bytes | Modified Date = 12/11/2007 5:07:20 PM | Attr = H ]
    sqmdata14.sqm -> %SystemDrive%\sqmdata14.sqm -> [Ver = | Size = 268 bytes | Modified Date = 12/11/2007 8:02:14 PM | Attr = H ]
    sqmdata15.sqm -> %SystemDrive%\sqmdata15.sqm -> [Ver = | Size = 268 bytes | Modified Date = 13/11/2007 3:15:30 PM | Attr = H ]
    sqmdata16.sqm -> %SystemDrive%\sqmdata16.sqm -> [Ver = | Size = 268 bytes | Modified Date = 13/11/2007 6:12:26 PM | Attr = H ]
    sqmdata17.sqm -> %SystemDrive%\sqmdata17.sqm -> [Ver = | Size = 268 bytes | Modified Date = 13/11/2007 7:50:40 PM | Attr = H ]
    sqmdata18.sqm -> %SystemDrive%\sqmdata18.sqm -> [Ver = | Size = 268 bytes | Modified Date = 14/11/2007 3:18:02 PM | Attr = H ]
    sqmdata19.sqm -> %SystemDrive%\sqmdata19.sqm -> [Ver = | Size = 268 bytes | Modified Date = 14/11/2007 3:38:52 PM | Attr = H ]
    sqmnoopt00.sqm -> %SystemDrive%\sqmnoopt00.sqm -> [Ver = | Size = 244 bytes | Modified Date = 14/11/2007 5:16:40 PM | Attr = H ]
    sqmnoopt01.sqm -> %SystemDrive%\sqmnoopt01.sqm -> [Ver = | Size = 244 bytes | Modified Date = 14/11/2007 8:13:20 PM | Attr = H ]
    sqmnoopt02.sqm -> %SystemDrive%\sqmnoopt02.sqm -> [Ver = | Size = 244 bytes | Modified Date = 15/11/2007 3:17:38 PM | Attr = H ]
    sqmnoopt03.sqm -> %SystemDrive%\sqmnoopt03.sqm -> [Ver = | Size = 244 bytes | Modified Date = 15/11/2007 4:03:26 PM | Attr = H ]
    sqmnoopt04.sqm -> %SystemDrive%\sqmnoopt04.sqm -> [Ver = | Size = 244 bytes | Modified Date = 15/11/2007 4:34:08 PM | Attr = H ]
    sqmnoopt05.sqm -> %SystemDrive%\sqmnoopt05.sqm -> [Ver = | Size = 244 bytes | Modified Date = 15/11/2007 7:13:04 PM | Attr = H ]
    sqmnoopt06.sqm -> %SystemDrive%\sqmnoopt06.sqm -> [Ver = | Size = 244 bytes | Modified Date = 16/11/2007 3:14:32 AM | Attr = H ]
    sqmnoopt07.sqm -> %SystemDrive%\sqmnoopt07.sqm -> [Ver = | Size = 244 bytes | Modified Date = 16/11/2007 5:20:36 AM | Attr = H ]
    sqmnoopt08.sqm -> %SystemDrive%\sqmnoopt08.sqm -> [Ver = | Size = 244 bytes | Modified Date = 16/11/2007 5:41:40 AM | Attr = H ]
    sqmnoopt09.sqm -> %SystemDrive%\sqmnoopt09.sqm -> [Ver = | Size = 244 bytes | Modified Date = 16/11/2007 6:21:16 AM | Attr = H ]
    sqmnoopt10.sqm -> %SystemDrive%\sqmnoopt10.sqm -> [Ver = | Size = 244 bytes | Modified Date = 16/11/2007 7:26:16 AM | Attr = H ]
    sqmnoopt11.sqm -> %SystemDrive%\sqmnoopt11.sqm -> [Ver = | Size = 244 bytes | Modified Date = 16/11/2007 9:38:54 PM | Attr = H ]
    sqmnoopt12.sqm -> %SystemDrive%\sqmnoopt12.sqm -> [Ver = | Size = 244 bytes | Modified Date = 17/11/2007 12:57:48 AM | Attr = H ]
    sqmnoopt13.sqm -> %SystemDrive%\sqmnoopt13.sqm -> [Ver = | Size = 244 bytes | Modified Date = 12/11/2007 5:07:20 PM | Attr = H ]
    sqmnoopt14.sqm -> %SystemDrive%\sqmnoopt14.sqm -> [Ver = | Size = 244 bytes | Modified Date = 12/11/2007 8:02:14 PM | Attr = H ]
    sqmnoopt15.sqm -> %SystemDrive%\sqmnoopt15.sqm -> [Ver = | Size = 244 bytes | Modified Date = 13/11/2007 3:15:30 PM | Attr = H ]
    sqmnoopt16.sqm -> %SystemDrive%\sqmnoopt16.sqm -> [Ver = | Size = 244 bytes | Modified Date = 13/11/2007 6:12:26 PM | Attr = H ]
    sqmnoopt17.sqm -> %SystemDrive%\sqmnoopt17.sqm -> [Ver = | Size = 244 bytes | Modified Date = 13/11/2007 7:50:40 PM | Attr = H ]
    sqmnoopt18.sqm -> %SystemDrive%\sqmnoopt18.sqm -> [Ver = | Size = 244 bytes | Modified Date = 14/11/2007 3:18:02 PM | Attr = H ]
    sqmnoopt19.sqm -> %SystemDrive%\sqmnoopt19.sqm -> [Ver = | Size = 244 bytes | Modified Date = 14/11/2007 3:38:52 PM | Attr = H ]
    WINDOWS -> %SystemRoot% -> [Folder | Modified Date = 20/11/2007 5:10:16 AM | Attr = ]
    bootstat.dat -> %SystemRoot%\bootstat.dat -> [Ver = | Size = 2048 bytes | Modified Date = 21/11/2007 3:54:02 AM | Attr = S]
    catchme.exe -> %SystemRoot%\catchme.exe -> [Ver = | Size = 136192 bytes | Modified Date = 29/10/2007 6:56:20 PM | Attr = ]
    Downloaded Program Files -> %SystemRoot%\Downloaded Program Files -> [Folder | Modified Date = 20/11/2007 3:31:34 AM | Attr = S]
    erdnt -> %SystemRoot%\erdnt -> [Folder | Modified Date = 17/11/2007 7:46:40 AM | Attr = ]
    ERUNT -> %SystemRoot%\ERUNT -> [Folder | Modified Date = 15/11/2007 3:48:20 PM | Attr = ]
    Fonts -> %SystemRoot%\Fonts -> [Folder | Modified Date = 12/10/2007 2:58:40 PM | Attr = R S]
    GunzLauncher.INI -> %SystemRoot%\GunzLauncher.INI -> [Ver = | Size = 50 bytes | Modified Date = 24/09/2007 3:22:52 PM | Attr = ]
    inf -> %SystemRoot%\inf -> [Folder | Modified Date = 18/11/2007 5:17:52 AM | Attr = H ]
    Installer -> %SystemRoot%\Installer -> [Folder | Modified Date = 17/11/2007 11:33:02 AM | Attr = HS]
    msettings.ini -> %SystemRoot%\msettings.ini -> [Ver = | Size = 21227 bytes | Modified Date = 16/11/2007 9:51:38 PM | Attr = ]
    Prefetch -> %SystemRoot%\Prefetch -> [Folder | Modified Date = 21/11/2007 4:12:10 AM | Attr = ]
    Registration -> %SystemRoot%\Registration -> [Folder | Modified Date = 20/11/2007 5:11:12 AM | Attr = ]
    system32 -> %System32% -> [Folder | Modified Date = 21/11/2007 3:58:16 AM | Attr = ]
    Tasks -> %SystemRoot%\Tasks -> [Folder | Modified Date = 16/11/2007 10:05:02 PM | Attr = S]
    TEMP -> %SystemRoot%\TEMP -> [Folder | Modified Date = 21/11/2007 3:54:38 AM | Attr = ]
    Norton AntiVirus - Scan my computer.job -> %SystemRoot%\tasks\Norton AntiVirus - Scan my computer.job -> [Ver = | Size = 480 bytes | Modified Date = 06/10/2007 8:24:58 AM | Attr = ]
    Norton SystemWorks One Button Checkup.job -> %SystemRoot%\tasks\Norton SystemWorks One Button Checkup.job -> [Ver = | Size = 414 bytes | Modified Date = 12/10/2007 4:39:52 PM | Attr = ]
    RegSweep Scheduled Scan.job -> %SystemRoot%\tasks\RegSweep Scheduled Scan.job -> [Ver = | Size = 384 bytes | Modified Date = 20/11/2007 3:30:02 AM | Attr = ]
    SA.DAT -> %SystemRoot%\tasks\SA.DAT -> [Ver = | Size = 6 bytes | Modified Date = 21/11/2007 3:54:06 AM | Attr = H ]
    Symantec NetDetect.job -> %SystemRoot%\tasks\Symantec NetDetect.job -> [Ver = | Size = 410 bytes | Modified Date = 21/11/2007 3:55:14 AM | Attr = ]
    bbesokwu.ini -> %System32%\bbesokwu.ini -> [Ver = | Size = 982511 bytes | Modified Date = 16/11/2007 3:22:00 AM | Attr = HS]
    CatRoot2 -> %System32%\CatRoot2 -> [Folder | Modified Date = 20/11/2007 3:30:58 AM | Attr = ]
    config -> %System32%\config -> [Folder | Modified Date = 17/11/2007 7:46:48 AM | Attr = ]
    cqnpvvcu.ini -> %System32%\cqnpvvcu.ini -> [Ver = | Size = 678100 bytes | Modified Date = 17/11/2007 7:42:40 AM | Attr = HS]
    dbkyxrru.ini -> %System32%\dbkyxrru.ini -> [Ver = | Size = 537469 bytes | Modified Date = 05/11/2007 4:58:10 PM | Attr = HS]
    ddnktgfk.ini -> %System32%\ddnktgfk.ini -> [Ver = | Size = 967822 bytes | Modified Date = 16/11/2007 3:22:02 AM | Attr = HS]
    dllcache -> %System32%\dllcache -> [Folder | Modified Date = 19/10/2007 7:54:38 AM | Attr = RHS]
    dqvrovni.ini -> %System32%\dqvrovni.ini -> [Ver = | Size = 585214 bytes | Modified Date = 11/11/2007 10:45:46 AM | Attr = HS]
    drivers -> %System32%\drivers -> [Folder | Modified Date = 21/11/2007 4:09:52 AM | Attr = ]
    dsfkxbxm.ini -> %System32%\dsfkxbxm.ini -> [Ver = | Size = 579438 bytes | Modified Date = 01/11/2007 2:19:30 PM | Attr = HS]
    dwfokvjc.ini -> %System32%\dwfokvjc.ini -> [Ver = | Size = 677980 bytes | Modified Date = 16/11/2007 5:53:50 AM | Attr = HS]
    ecxebjmi.ini -> %System32%\ecxebjmi.ini -> [Ver = | Size = 585436 bytes | Modified Date = 11/11/2007 3:14:14 PM | Attr = HS]
    FNTCACHE.DAT -> %System32%\FNTCACHE.DAT -> [Ver = | Size = 1432816 bytes | Modified Date = 12/10/2007 3:55:46 PM | Attr = ]
    gkiuqspp.ini -> %System32%\gkiuqspp.ini -> [Ver = | Size = 1225292 bytes | Modified Date = 15/11/2007 4:43:46 AM | Attr = HS]
    hcfdpjnr.ini -> %System32%\hcfdpjnr.ini -> [Ver = | Size = 583166 bytes | Modified Date = 12/11/2007 10:00:28 AM | Attr = HS]
    hhovrsxq.ini -> %System32%\hhovrsxq.ini -> [Ver = | Size = 585316 bytes | Modified Date = 11/11/2007 2:06:20 PM | Attr = HS]
    instdump.dmp -> %System32%\instdump.dmp -> [Ver = | Size = 86857 bytes | Modified Date = 15/11/2007 3:30:36 PM | Attr = ]
    instdump.zip -> %System32%\instdump.zip -> [Ver = | Size = 16324 bytes | Modified Date = 15/11/2007 3:30:48 PM | Attr = ]
    itlhywbg.ini -> %System32%\itlhywbg.ini -> [Ver = | Size = 584836 bytes | Modified Date = 10/11/2007 12:39:54 PM | Attr = HS]
    Kaspersky Lab -> %System32%\Kaspersky Lab -> [Folder | Modified Date = 18/11/2007 5:17:52 AM | Attr = ]
    kxbkryvr.ini -> %System32%\kxbkryvr.ini -> [Ver = | Size = 585616 bytes | Modified Date = 11/11/2007 5:30:16 PM | Attr = HS]
    leatiraq.ini -> %System32%\leatiraq.ini -> [Ver = | Size = 671187 bytes | Modified Date = 14/11/2007 3:41:04 PM | Attr = HS]
    lotlaluc.ini -> %System32%\lotlaluc.ini -> [Ver = | Size = 590836 bytes | Modified Date = 12/11/2007 12:00:18 PM | Attr = HS]
    lpbhfxyk.ini -> %System32%\lpbhfxyk.ini -> [Ver = | Size = 591196 bytes | Modified Date = 12/11/2007 8:07:58 PM | Attr = HS]
    lxbrhfps.ini -> %System32%\lxbrhfps.ini -> [Ver = | Size = 584596 bytes | Modified Date = 10/11/2007 9:30:42 AM | Attr = HS]
    lycwdiyd.ini -> %System32%\lycwdiyd.ini -> [Ver = | Size = 584965 bytes | Modified Date = 10/11/2007 2:33:30 PM | Attr = HS]
    mbpnebfm.ini -> %System32%\mbpnebfm.ini -> [Ver = | Size = 585076 bytes | Modified Date = 10/11/2007 5:18:18 PM | Attr = HS]
    mqufbcvp.ini -> %System32%\mqufbcvp.ini -> [Ver = | Size = 669740 bytes | Modified Date = 15/11/2007 4:02:56 PM | Attr = HS]
    nwkhsxrc.ini -> %System32%\nwkhsxrc.ini -> [Ver = | Size = 669053 bytes | Modified Date = 13/11/2007 6:11:10 PM | Attr = HS]
    oucyvwav.ini -> %System32%\oucyvwav.ini -> [Ver = | Size = 591136 bytes | Modified Date = 12/11/2007 8:07:58 PM | Attr = HS]
    perfc009.dat -> %System32%\perfc009.dat -> [Ver = | Size = 40108 bytes | Modified Date = 21/11/2007 3:58:16 AM | Attr = ]
    perfh009.dat -> %System32%\perfh009.dat -> [Ver = | Size = 311912 bytes | Modified Date = 21/11/2007 3:58:16 AM | Attr = ]
    PerfStringBackup.INI -> %System32%\PerfStringBackup.INI -> [Ver = | Size = 356120 bytes | Modified Date = 21/11/2007 3:58:16 AM | Attr = ]
    pjeqpwsh.ini -> %System32%\pjeqpwsh.ini -> [Ver = | Size = 590956 bytes | Modified Date = 12/11/2007 12:41:12 PM | Attr = HS]
    qqjpftxi.ini -> %System32%\qqjpftxi.ini -> [Ver = | Size = 669113 bytes | Modified Date = 13/11/2007 6:18:00 PM | Attr = HS]
    rlpfkqto.ini -> %System32%\rlpfkqto.ini -> [Ver = | Size = 478974 bytes | Modified Date = 07/11/2007 9:09:48 PM | Attr = HS]
    rlpfkqto.tmp -> %System32%\rlpfkqto.tmp -> [Ver = | Size = 478974 bytes | Modified Date = 07/11/2007 9:09:54 PM | Attr = ]
    rnwrakxr.ini -> %System32%\rnwrakxr.ini -> [Ver = | Size = 487610 bytes | Modified Date = 07/11/2007 7:49:18 PM | Attr = HS]
    syvnivnd.ini -> %System32%\syvnivnd.ini -> [Ver = | Size = 549891 bytes | Modified Date = 02/11/2007 2:16:06 PM | Attr = HS]
    tgbbnlro.ini -> %System32%\tgbbnlro.ini -> [Ver = | Size = 577678 bytes | Modified Date = 31/10/2007 3:19:14 PM | Attr = HS]
    tgscbiwy.ini -> %System32%\tgscbiwy.ini -> [Ver = | Size = 671187 bytes | Modified Date = 14/11/2007 8:12:56 PM | Attr = HS]
    tmirbebl.ini -> %System32%\tmirbebl.ini -> [Ver = | Size = 585616 bytes | Modified Date = 11/11/2007 5:24:32 PM | Attr = HS]
    tmp.reg -> %System32%\tmp.reg -> [Ver = | Size = 1338 bytes | Modified Date = 16/11/2007 5:13:40 AM | Attr = ]
    twosksuk.ini -> %System32%\twosksuk.ini -> [Ver = | Size = 590716 bytes | Modified Date = 12/11/2007 10:23:02 AM | Attr = HS]
    upmyttrs.ini -> %System32%\upmyttrs.ini -> [Ver = | Size = 584476 bytes | Modified Date = 09/11/2007 3:17:52 PM | Attr = HS]
    urcopqvc.ini -> %System32%\urcopqvc.ini -> [Ver = | Size = 584545 bytes | Modified Date = 12/11/2007 9:34:24 AM | Attr = HS]
    vboglmqe.ini -> %System32%\vboglmqe.ini -> [Ver = | Size = 671247 bytes | Modified Date = 14/11/2007 3:41:10 PM | Attr = HS]
    vuctgigm.ini -> %System32%\vuctgigm.ini -> [Ver = | Size = 540084 bytes | Modified Date = 04/11/2007 9:47:12 AM | Attr = HS]
    wkdjtltq.ini -> %System32%\wkdjtltq.ini -> [Ver = | Size = 478854 bytes | Modified Date = 07/11/2007 8:27:26 PM | Attr = HS]
    wpa.dbl -> %System32%\wpa.dbl -> [Ver = | Size = 2206 bytes | Modified Date = 15/11/2007 7:11:12 AM | Attr = ]
    xvxrwwdk.ini -> %System32%\xvxrwwdk.ini -> [Ver = | Size = 671316 bytes | Modified Date = 15/11/2007 3:19:34 PM | Attr = HS]
    yktmqmln.ini -> %System32%\yktmqmln.ini -> [Ver = | Size = 668993 bytes | Modified Date = 13/11/2007 8:01:24 PM | Attr = HS]
    yrxytved.ini -> %System32%\yrxytved.ini -> [Ver = | Size = 678040 bytes | Modified Date = 16/11/2007 5:53:18 AM | Attr = HS]
    yvsmwyap.ini -> %System32%\yvsmwyap.ini -> [Ver = | Size = 584743 bytes | Modified Date = 10/11/2007 12:21:00 PM | Attr = HS]
    etc -> %System32%\drivers\etc -> [Folder | Modified Date = 18/11/2007 5:11:24 AM | Attr = ]
    [File String Scan - Non-Microsoft Only]
    PEC2 , -> %System32%\dfrg.msc -> [Ver = | Size = 41397 bytes | Modified Date = 23/08/2001 7:00:00 AM | Attr = ]
    UPX! , UPX0 , -> %System32%\swreg.exe -> SteelWerX [Ver = 2.0.1.8 | Size = 279552 bytes | Modified Date = 22/07/2007 6:39:28 PM | Attr = ]
    winsync , -> %System32%\wbdbase.deu -> [Ver = | Size = 1309184 bytes | Modified Date = 23/08/2001 7:00:00 AM | Attr = ]
    WSUD , UPX0 , -> %System32%\dllcache\hwxjpn.dll -> [Ver = | Size = 13463552 bytes | Modified Date = 23/08/2001 7:00:00 AM | Attr = ]
    < End of report >
  • edited November 2007
    Hi jinlord

    Please visit Virustotal
    • Click the Browse... button
    • Navigate to the file C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    • Click the Open button
    • Click the Send button
    • Do the same for the following Files:
    • C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    • C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapw32.exe
    • Copy and paste the results back here please.
  • edited November 2007
    Whilst we appreciate that you may be busy, it has been 4days or more since we heard from you.

    Infections can change and fresh instructions will now need to be given. This topic is now closed, if you still require assistance then please start a new topic in the Spyware & Virus Removal Forum

    If you wish this topic reopened, please send a Private Message (PM) to one of the Spyware Mods with a link to your thread.

    Do not bother contacting us if you are not the topic starter. A valid, working link to the closed topic is required.
    If you are not the user who started this thread, you must start a new Thread instead :)
Sign In or Register to comment.