clotsyone
2008-10-13, 12:40
Hi, not sure how this happend but i have this on my system and SpyBot finds but can't remove for some reason. I have attached the error file below and hope that someone can give me the way to delete this virus.
Thanks in advance - Kelvin
--- Search result list ---
Hint of the Day: Click the bar at the right of this to see more information! ()
Smitfraud-C.: [SBI $C30A3B68] Type library (Registry key, fixing failed)
HKEY_CLASSES_ROOT\TypeLib\{9233C3C0-1472-4091-A505-5580A23BB4AC}
Smitfraud-C.: [SBI $C30A3B68] Type library (Registry key, fixing failed)
HKEY_CLASSES_ROOT\TypeLib\{9233C3C0-1472-4091-A505-5580A23BB4AC}
--- Spybot - Search & Destroy version: 1.6.0 (build: 20080707) ---
2008-07-07 blindman.exe (1.0.0.8)
2008-07-07 SDFiles.exe (1.6.0.4)
2008-07-07 SDMain.exe (1.0.0.6)
2008-07-07 SDShred.exe (1.0.2.3)
2008-07-07 SDUpdate.exe (1.6.0.8)
2008-07-07 SDWinSec.exe (1.0.0.12)
2008-07-07 SpybotSD.exe (1.6.0.30)
2008-09-16 TeaTimer.exe (1.6.3.25)
2008-10-12 unins000.exe (51.49.0.0)
2008-07-07 Update.exe (1.6.0.7)
2008-07-07 advcheck.dll (1.6.1.12)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2008-09-15 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2008-07-07 Tools.dll (2.1.5.7)
2008-09-02 Includes\Adware.sbi (*)
2008-10-07 Includes\AdwareC.sbi (*)
2008-06-03 Includes\Cookies.sbi (*)
2008-09-02 Includes\Dialer.sbi (*)
2008-09-09 Includes\DialerC.sbi (*)
2008-07-23 Includes\HeavyDuty.sbi (*)
2008-09-02 Includes\Hijackers.sbi (*)
2008-10-07 Includes\HijackersC.sbi (*)
2008-09-09 Includes\Keyloggers.sbi (*)
2008-09-30 Includes\KeyloggersC.sbi (*)
2004-11-29 Includes\LSP.sbi (*)
2008-10-08 Includes\Malware.sbi (*)
2008-10-08 Includes\MalwareC.sbi (*)
2008-09-02 Includes\PUPS.sbi (*)
2008-10-07 Includes\PUPSC.sbi (*)
2007-11-07 Includes\Revision.sbi (*)
2008-06-18 Includes\Security.sbi (*)
2008-09-30 Includes\SecurityC.sbi (*)
2008-06-03 Includes\Spybots.sbi (*)
2008-06-03 Includes\SpybotsC.sbi (*)
2008-09-09 Includes\Spyware.sbi (*)
2008-09-23 Includes\SpywareC.sbi (*)
2008-06-03 Includes\Tracks.uti
2008-09-30 Includes\Trojans.sbi (*)
2008-10-07 Includes\TrojansC.sbi (*)
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll
--- System information ---
Windows 2003/XPx64 (Build: 3790) Service Pack 2 (5.2.3790)
/ MSXML4SP2: Security update for MSXML4 SP2 (KB936181)
--- Startup entries list ---
Located: HK_LM:Run, Adobe Reader Speed Launcher
command: "E:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe"
file: E:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe
size: 34672
MD5: 69B16C7B7746BA5C642FC05B3561FC73
Located: HK_LM:Run, avast!
command: E:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
file: E:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
size: 78008
MD5: 66893067C2FB0505F151D3FCB8EA92B5
Located: HK_LM:Run, JMB36X Configure
command: E:\WINDOWS\SysWOW64\JMRaidSetup.exe boot
file: E:\WINDOWS\SysWOW64\JMRaidSetup.exe
size: 1953792
MD5: C46705CA914F3C8DC27916BA1AFE1866
Located: HK_LM:Run, JMB36X IDE Setup
command: E:\WINDOWS\JM\JMInsIDE.exe
file: E:\WINDOWS\JM\JMInsIDE.exe
size: 36864
MD5: 47BBA427E91CBB98E41A17B38644987C
Located: HK_LM:RunOnce, SpybotSnD
command: "E:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
file: E:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe
size: 4891472
MD5: 3B1B5D09D3C9C4CD39D4DB06ED7A0855
Located: HK_CU:RunOnce, tscuninstall
where: .DEFAULT...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:RunOnce, tscuninstall
where: S-1-5-19...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:RunOnce, tscuninstall
where: S-1-5-20...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:Run, ctfmon.exe
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\WINDOWS\system32\ctfmon.exe
file: E:\WINDOWS\system32\ctfmon.exe
size: 15360
MD5: 07C627121E84C7EBF7E38E3A1DBCDEC3
Located: HK_CU:Run, IncrediMail
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\Program Files (x86)\IncrediMail\bin\IncMail.exe /c
file: E:\Program Files (x86)\IncrediMail\bin\IncMail.exe
size: 243072
MD5: 7AD7DAAA39AD39931E5947543084DDF3
Located: HK_CU:Run, MSFox
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\video255.cfg.exe
file: E:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\video255.cfg.exe
size: 78852
MD5: 6F06F07F733754C8FB86E823F2B3E4D6
Located: HK_CU:Run, SpybotSD TeaTimer
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
file: E:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
size: 1833296
MD5: 63B3FF83B87AFCEBA89CED54695DA0F6
Located: HK_CU:Run, swg
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
file: E:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
size: 68856
MD5: E616A6A6E91B0A86F2F6217CDE835FFE
Located: HK_CU:Run, UtilSrv
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\WINDOWS\system32\twbsdwnu.exe
file: E:\WINDOWS\system32\twbsdwnu.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:RunOnce, tscuninstall
where: S-1-5-18...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: Startup (common), Logitech SetPoint.lnk
where: E:\Documents and Settings\All Users\Start Menu\Programs\Startup...
command: E:\Program Files\Logitech\SetPoint\SetPoint.exe
file: E:\Program Files\Logitech\SetPoint\SetPoint.exe
size: 1196048
MD5: 834E71F5767213C87976680AACF4ACEE
Located: WinLogon, crypt32chain
command: crypt32.dll
file: crypt32.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, cryptnet
command: cryptnet.dll
file: cryptnet.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, cscdll
command: cscdll.dll
file: cscdll.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, dimsntfy
command: dimsntfy.dll
file: dimsntfy.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, EFS
command: sclgntfy.dll
file: sclgntfy.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, ScCertProp
command: wlnotify.dll
file: wlnotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, Schedule
command: wlnotify.dll
file: wlnotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, sclgntfy
command: sclgntfy.dll
file: sclgntfy.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, SensLogn
command: WlNotify.dll
file: WlNotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, wlballoon
command: wlnotify.dll
file: wlnotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
--- Browser helper object list ---
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} (AcroIEHelperStub)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: AcroIEHelperStub
CLSID name: Adobe PDF Link Helper
Path: E:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\
Long name: AcroIEHelperShim.dll
Short name: ACROIE~2.DLL
Date (created): 11/06/2008 22:33:16
Date (last access): 13/10/2008 10:08:02
Date (last write): 11/06/2008 22:33:16
Filesize: 75128
Attributes: archive
MD5: E96C752BBA0E22330A43258FC800200E
CRC32: E5D72083
Version: 9.0.0.332
{53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Spybot-S&D IE Protection
description: Spybot-S&D IE Browser plugin
classification: Legitimate
known filename: SDhelper.dll
info link: http://spybot.eon.net.au/
info source: Patrick M. Kolla
Path: E:\PROGRA~2\SPYBOT~1\
Long name: SDHelper.dll
Short name:
Date (created): 12/10/2008 14:57:50
Date (last access): 13/10/2008 10:18:12
Date (last write): 15/09/2008 14:25:44
Filesize: 1562960
Attributes: readonly hidden sysfile archive
MD5: 35F73F1936BDE91F1B6995510A61E7A8
CRC32: BE6A5D15
Version: 1.6.2.14
{AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Google Toolbar Helper
description: Google toolbar
classification: Open for discussion
known filename: googletoolbar.dll<br>googletoolbar*.dll<br>(* = number)<br>googletoolbar_en_*.**-big.dll<br>Googletoolbar_en_*.*.**-deleon.dll
info link: http://toolbar.google.com/
info source: TonyKlein
Path: e:\program files (x86)\google\
Long name: GoogleToolbar1.dll
Short name: GOOGLE~1.DLL
Date (created): 01/10/2008 17:16:24
Date (last access): 13/10/2008 09:21:54
Date (last write): 01/10/2008 17:16:24
Filesize: 2403392
Attributes: readonly archive
MD5: 52DEC141D5FF9A4DD7843C7D4414E4A6
CRC32: 34C22780
Version: 4.0.1601.4978
{AF69DE43-7D58-4638-B6FA-CE66B5AD205D} (Google Toolbar Notifier BHO)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Google Toolbar Notifier BHO
Path: E:\Program Files (x86)\Google\GoogleToolbarNotifier\3.1.807.1746\
Long name: swg.dll
Short name:
Date (created): 09/10/2008 10:16:10
Date (last access): 13/10/2008 10:13:08
Date (last write): 09/10/2008 10:16:10
Filesize: 737776
Attributes: archive
MD5: AB32387A8F8C696A0739768B6B913714
CRC32: F4E76414
Version: 3.1.807.1746
--- ActiveX list ---
{166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control)
DPF name:
CLSID name: Shockwave ActiveX Control
Installer: E:\WINDOWS\Downloaded Program Files\swdir.inf
Codebase: http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
description: Macromedia ShockWave Flash Player 7
classification: Legitimate
known filename: SWDIR.DLL
info link:
info source: Patrick M. Kolla
Path: E:\WINDOWS\SysWow64\Adobe\Director\
Long name: swdir.dll
Short name:
Date (created): 01/10/2008 17:13:08
Date (last access): 12/10/2008 14:17:42
Date (last write): 06/08/2008 16:30:48
Filesize: 202168
Attributes: archive
MD5: B8153BAD2E56C50B147867FA9DAEB095
CRC32: D52113FA
Version: 11.0.0.465
{6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class)
DPF name:
CLSID name: WUWebControl Class
Installer: E:\WINDOWS\Downloaded Program Files\wuweb.inf
Codebase: http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1217235202437
description:
classification: Legitimate
known filename: wuweb.dll
info link:
info source: Safer Networking Ltd.
Path: E:\WINDOWS\SysWow64\
Long name: wuweb.dll
Short name:
Date (created): 28/07/2008 09:11:00
Date (last access): 13/10/2008 10:09:50
Date (last write): 18/07/2008 22:09:44
Filesize: 205000
Attributes: archive
MD5: 4889720E56E85E1FE4659039BB5F6E3F
CRC32: EE278BD5
Version: 7.2.6001.784
{7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist))
DPF name:
CLSID name: Microsoft RDP Client Control (redist)
Installer: E:\WINDOWS\Downloaded Program Files\msrdp.inf
Codebase: https://81.86.26.166/Remote/msrdp.cab
description:
classification: Legitimate
known filename: msrdp.ocx
info link:
info source: Safer Networking Ltd.
Path: E:\WINDOWS\Downloaded Program Files\
Long name: msrdp.ocx
Short name:
Date (created): 24/03/2005 16:27:26
Date (last access): 24/09/2008 12:42:20
Date (last write): 24/03/2005 16:27:26
Filesize: 754176
Attributes: archive
MD5: 9622600F464AE6AE99B44BD0CF58A52F
CRC32: 836C96CA
Version: 5.2.3790.1830
{8FFBE65D-2C9C-4669-84BD-5829DC0B603C} ()
DPF name:
CLSID name:
Installer: E:\WINDOWS\Downloaded Program Files\erma.inf
Codebase: http://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
description:
classification: Open for discussion
known filename:
info link:
info source: Safer Networking Ltd.
{D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object)
DPF name:
CLSID name: Shockwave Flash Object
Installer: E:\WINDOWS\Downloaded Program Files\swflash.inf
Codebase: http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
description: Macromedia Shockwave Flash Player
classification: Legitimate
known filename:
info link:
info source: Patrick M. Kolla
Path: E:\WINDOWS\SysWow64\Macromed\Flash\
Long name: Flash9f.ocx
Short name:
Date (created): 25/03/2008 03:32:42
Date (last access): 13/10/2008 08:51:46
Date (last write): 25/03/2008 03:32:42
Filesize: 2991488
Attributes: readonly archive
MD5: 48FDF435B8595604E54125B321924510
CRC32: 12335E29
Version: 9.0.124.0
--- Process list ---
PID: 0 ( 0) [System]
PID: 1280 ( 424) E:\Program Files (x86)\Bonjour\mDNSResponder.exe
size: 229376
MD5: 73686FE0B2E0469F89FD2075BE724704
PID: 1532 ( 424) e:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
size: 29178224
MD5: D07C9575726797B0E9069E1108A1C483
PID: 1644 ( 424) e:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe
size: 242544
MD5: D2B096CD2F56FAC6EEEED9A77DDF6DC8
PID: 2368 (2236) E:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
size: 68856
MD5: E616A6A6E91B0A86F2F6217CDE835FFE
PID: 1600 (2236) E:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe
size: 4891472
MD5: 3B1B5D09D3C9C4CD39D4DB06ED7A0855
PID: 936 (3064) E:\Program Files\Alwil Software\Avast4\ashSimpl.exe
size: 155832
MD5: EF2CB30A6C64A0CEAF60839C531A2207
PID: 2052 ( 424) E:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
size: 322120
MD5: 11F714F85530A2BD134074DC30E99FCA
PID: 2556 ( 936) E:\WINDOWS\system32\ctfmon.exe
size: 15360
MD5: 07C627121E84C7EBF7E38E3A1DBCDEC3
PID: 4 ( 0) System
PID: 304 ( 4) E:\WINDOWS\system32\smss.exe
size: 53760
MD5: 97E9B4A202E645E7826BE7597B335C47
PID: 352 ( 304) E:\WINDOWS\system32\csrss.exe
PID: 376 ( 304) E:\WINDOWS\system32\winlogon.exe
PID: 424 ( 376) E:\WINDOWS\system32\services.exe
PID: 436 ( 376) E:\WINDOWS\system32\lsass.exe
PID: 608 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 680 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 724 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 772 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 808 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 1192 ( 424) E:\WINDOWS\system32\spoolsv.exe
size: 110080
MD5: 5918677301E62A935A837EC22BA7088C
PID: 1328 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 1432 ( 424) E:\WINDOWS\system32\inetsrv\inetinfo.exe
PID: 1604 ( 424) E:\WINDOWS\system32\nvsvc64.exe
PID: 1668 ( 424) E:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
size: 156016
MD5: 582F8B13E1042C49A4A5A7BB52F518E4
PID: 1724 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 1960 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 2236 (2188) E:\WINDOWS\explorer.exe
size: 1364480
MD5: AE7A08C05F72A9242734C03230A5CD7F
PID: 2244 ( 608) E:\WINDOWS\system32\wbem\wmiprvse.exe
size: 207872
MD5: CE7B5D3CB3682435725CAB1C4D9FB145
PID: 2668 ( 424) E:\WINDOWS\system32\alg.exe
size: 45056
MD5: FD79AFA46B60D32557CB62F6050C2B69
PID: 2176 (2236) E:\WINDOWS\system32\ctfmon.exe
size: 15360
MD5: 07C627121E84C7EBF7E38E3A1DBCDEC3
PID: 2160 (2236) E:\Program Files\Logitech\SetPoint\SetPoint.exe
size: 1196048
MD5: 834E71F5767213C87976680AACF4ACEE
PID: 2472 ( 376) E:\WINDOWS\system32\taskmgr.exe
size: 168960
MD5: 96BB332BF16E25EF3081491B55FA0F9F
PID: 288 ( 724) E:\WINDOWS\system32\wuauclt.exe
--- Browser start & search pages list ---
Spybot - Search & Destroy browser pages report, 13/10/2008 10:18:46
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
E:\WINDOWS\system32\blank.htm
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.akroservices.co.uk/
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
%SystemRoot%\system32\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
http://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
http://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\CustomizeSearch
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm
--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip
Protocol 1: MSAFD Tcpip [UDP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip
Protocol 2: MSAFD Tcpip [RAW/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip
Protocol 3: RSVP UDP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Protocol 4: RSVP TCP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Namespace Provider 0: Tcpip
GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B}
Filename: %SystemRoot%\System32\mswsock.dll
Description: Microsoft Windows NT/2k/XP TCP/IP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: TCP/IP
Namespace Provider 1: NTDS
GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC}
Filename: %SystemRoot%\System32\winrnr.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\winrnr.dll
DB protocol: NTDS
Namespace Provider 2: Network Location Awareness (NLA) Namespace
GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83}
Filename: %SystemRoot%\System32\mswsock.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: NLA-Namespace
Namespace Provider 3: mdnsNSP
GUID: {B600E6E9-553B-4A19-8696-335E5C896153}
Filename: E:\Program Files (x86)\Bonjour\mdnsNSP.dll
Description: Apple Rendezvous protocol
DB filename: %ProgramFiles%\Rendezvous\bin\mdnsNSP.dll
DB protocol: mdnsNSP
Thanks in advance - Kelvin
--- Search result list ---
Hint of the Day: Click the bar at the right of this to see more information! ()
Smitfraud-C.: [SBI $C30A3B68] Type library (Registry key, fixing failed)
HKEY_CLASSES_ROOT\TypeLib\{9233C3C0-1472-4091-A505-5580A23BB4AC}
Smitfraud-C.: [SBI $C30A3B68] Type library (Registry key, fixing failed)
HKEY_CLASSES_ROOT\TypeLib\{9233C3C0-1472-4091-A505-5580A23BB4AC}
--- Spybot - Search & Destroy version: 1.6.0 (build: 20080707) ---
2008-07-07 blindman.exe (1.0.0.8)
2008-07-07 SDFiles.exe (1.6.0.4)
2008-07-07 SDMain.exe (1.0.0.6)
2008-07-07 SDShred.exe (1.0.2.3)
2008-07-07 SDUpdate.exe (1.6.0.8)
2008-07-07 SDWinSec.exe (1.0.0.12)
2008-07-07 SpybotSD.exe (1.6.0.30)
2008-09-16 TeaTimer.exe (1.6.3.25)
2008-10-12 unins000.exe (51.49.0.0)
2008-07-07 Update.exe (1.6.0.7)
2008-07-07 advcheck.dll (1.6.1.12)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2008-09-15 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2008-07-07 Tools.dll (2.1.5.7)
2008-09-02 Includes\Adware.sbi (*)
2008-10-07 Includes\AdwareC.sbi (*)
2008-06-03 Includes\Cookies.sbi (*)
2008-09-02 Includes\Dialer.sbi (*)
2008-09-09 Includes\DialerC.sbi (*)
2008-07-23 Includes\HeavyDuty.sbi (*)
2008-09-02 Includes\Hijackers.sbi (*)
2008-10-07 Includes\HijackersC.sbi (*)
2008-09-09 Includes\Keyloggers.sbi (*)
2008-09-30 Includes\KeyloggersC.sbi (*)
2004-11-29 Includes\LSP.sbi (*)
2008-10-08 Includes\Malware.sbi (*)
2008-10-08 Includes\MalwareC.sbi (*)
2008-09-02 Includes\PUPS.sbi (*)
2008-10-07 Includes\PUPSC.sbi (*)
2007-11-07 Includes\Revision.sbi (*)
2008-06-18 Includes\Security.sbi (*)
2008-09-30 Includes\SecurityC.sbi (*)
2008-06-03 Includes\Spybots.sbi (*)
2008-06-03 Includes\SpybotsC.sbi (*)
2008-09-09 Includes\Spyware.sbi (*)
2008-09-23 Includes\SpywareC.sbi (*)
2008-06-03 Includes\Tracks.uti
2008-09-30 Includes\Trojans.sbi (*)
2008-10-07 Includes\TrojansC.sbi (*)
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll
--- System information ---
Windows 2003/XPx64 (Build: 3790) Service Pack 2 (5.2.3790)
/ MSXML4SP2: Security update for MSXML4 SP2 (KB936181)
--- Startup entries list ---
Located: HK_LM:Run, Adobe Reader Speed Launcher
command: "E:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe"
file: E:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe
size: 34672
MD5: 69B16C7B7746BA5C642FC05B3561FC73
Located: HK_LM:Run, avast!
command: E:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
file: E:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
size: 78008
MD5: 66893067C2FB0505F151D3FCB8EA92B5
Located: HK_LM:Run, JMB36X Configure
command: E:\WINDOWS\SysWOW64\JMRaidSetup.exe boot
file: E:\WINDOWS\SysWOW64\JMRaidSetup.exe
size: 1953792
MD5: C46705CA914F3C8DC27916BA1AFE1866
Located: HK_LM:Run, JMB36X IDE Setup
command: E:\WINDOWS\JM\JMInsIDE.exe
file: E:\WINDOWS\JM\JMInsIDE.exe
size: 36864
MD5: 47BBA427E91CBB98E41A17B38644987C
Located: HK_LM:RunOnce, SpybotSnD
command: "E:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
file: E:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe
size: 4891472
MD5: 3B1B5D09D3C9C4CD39D4DB06ED7A0855
Located: HK_CU:RunOnce, tscuninstall
where: .DEFAULT...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:RunOnce, tscuninstall
where: S-1-5-19...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:RunOnce, tscuninstall
where: S-1-5-20...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:Run, ctfmon.exe
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\WINDOWS\system32\ctfmon.exe
file: E:\WINDOWS\system32\ctfmon.exe
size: 15360
MD5: 07C627121E84C7EBF7E38E3A1DBCDEC3
Located: HK_CU:Run, IncrediMail
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\Program Files (x86)\IncrediMail\bin\IncMail.exe /c
file: E:\Program Files (x86)\IncrediMail\bin\IncMail.exe
size: 243072
MD5: 7AD7DAAA39AD39931E5947543084DDF3
Located: HK_CU:Run, MSFox
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\video255.cfg.exe
file: E:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\video255.cfg.exe
size: 78852
MD5: 6F06F07F733754C8FB86E823F2B3E4D6
Located: HK_CU:Run, SpybotSD TeaTimer
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
file: E:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
size: 1833296
MD5: 63B3FF83B87AFCEBA89CED54695DA0F6
Located: HK_CU:Run, swg
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
file: E:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
size: 68856
MD5: E616A6A6E91B0A86F2F6217CDE835FFE
Located: HK_CU:Run, UtilSrv
where: S-1-5-21-1851065067-3386739981-814519529-500...
command: E:\WINDOWS\system32\twbsdwnu.exe
file: E:\WINDOWS\system32\twbsdwnu.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_CU:RunOnce, tscuninstall
where: S-1-5-18...
command: %systemroot%\system32\tscupgrd.exe
file: E:\WINDOWS\system32\tscupgrd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: Startup (common), Logitech SetPoint.lnk
where: E:\Documents and Settings\All Users\Start Menu\Programs\Startup...
command: E:\Program Files\Logitech\SetPoint\SetPoint.exe
file: E:\Program Files\Logitech\SetPoint\SetPoint.exe
size: 1196048
MD5: 834E71F5767213C87976680AACF4ACEE
Located: WinLogon, crypt32chain
command: crypt32.dll
file: crypt32.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, cryptnet
command: cryptnet.dll
file: cryptnet.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, cscdll
command: cscdll.dll
file: cscdll.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, dimsntfy
command: dimsntfy.dll
file: dimsntfy.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, EFS
command: sclgntfy.dll
file: sclgntfy.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, ScCertProp
command: wlnotify.dll
file: wlnotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, Schedule
command: wlnotify.dll
file: wlnotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, sclgntfy
command: sclgntfy.dll
file: sclgntfy.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, SensLogn
command: WlNotify.dll
file: WlNotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: WinLogon, wlballoon
command: wlnotify.dll
file: wlnotify.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
--- Browser helper object list ---
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} (AcroIEHelperStub)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: AcroIEHelperStub
CLSID name: Adobe PDF Link Helper
Path: E:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\
Long name: AcroIEHelperShim.dll
Short name: ACROIE~2.DLL
Date (created): 11/06/2008 22:33:16
Date (last access): 13/10/2008 10:08:02
Date (last write): 11/06/2008 22:33:16
Filesize: 75128
Attributes: archive
MD5: E96C752BBA0E22330A43258FC800200E
CRC32: E5D72083
Version: 9.0.0.332
{53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Spybot-S&D IE Protection
description: Spybot-S&D IE Browser plugin
classification: Legitimate
known filename: SDhelper.dll
info link: http://spybot.eon.net.au/
info source: Patrick M. Kolla
Path: E:\PROGRA~2\SPYBOT~1\
Long name: SDHelper.dll
Short name:
Date (created): 12/10/2008 14:57:50
Date (last access): 13/10/2008 10:18:12
Date (last write): 15/09/2008 14:25:44
Filesize: 1562960
Attributes: readonly hidden sysfile archive
MD5: 35F73F1936BDE91F1B6995510A61E7A8
CRC32: BE6A5D15
Version: 1.6.2.14
{AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Google Toolbar Helper
description: Google toolbar
classification: Open for discussion
known filename: googletoolbar.dll<br>googletoolbar*.dll<br>(* = number)<br>googletoolbar_en_*.**-big.dll<br>Googletoolbar_en_*.*.**-deleon.dll
info link: http://toolbar.google.com/
info source: TonyKlein
Path: e:\program files (x86)\google\
Long name: GoogleToolbar1.dll
Short name: GOOGLE~1.DLL
Date (created): 01/10/2008 17:16:24
Date (last access): 13/10/2008 09:21:54
Date (last write): 01/10/2008 17:16:24
Filesize: 2403392
Attributes: readonly archive
MD5: 52DEC141D5FF9A4DD7843C7D4414E4A6
CRC32: 34C22780
Version: 4.0.1601.4978
{AF69DE43-7D58-4638-B6FA-CE66B5AD205D} (Google Toolbar Notifier BHO)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Google Toolbar Notifier BHO
Path: E:\Program Files (x86)\Google\GoogleToolbarNotifier\3.1.807.1746\
Long name: swg.dll
Short name:
Date (created): 09/10/2008 10:16:10
Date (last access): 13/10/2008 10:13:08
Date (last write): 09/10/2008 10:16:10
Filesize: 737776
Attributes: archive
MD5: AB32387A8F8C696A0739768B6B913714
CRC32: F4E76414
Version: 3.1.807.1746
--- ActiveX list ---
{166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control)
DPF name:
CLSID name: Shockwave ActiveX Control
Installer: E:\WINDOWS\Downloaded Program Files\swdir.inf
Codebase: http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
description: Macromedia ShockWave Flash Player 7
classification: Legitimate
known filename: SWDIR.DLL
info link:
info source: Patrick M. Kolla
Path: E:\WINDOWS\SysWow64\Adobe\Director\
Long name: swdir.dll
Short name:
Date (created): 01/10/2008 17:13:08
Date (last access): 12/10/2008 14:17:42
Date (last write): 06/08/2008 16:30:48
Filesize: 202168
Attributes: archive
MD5: B8153BAD2E56C50B147867FA9DAEB095
CRC32: D52113FA
Version: 11.0.0.465
{6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class)
DPF name:
CLSID name: WUWebControl Class
Installer: E:\WINDOWS\Downloaded Program Files\wuweb.inf
Codebase: http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1217235202437
description:
classification: Legitimate
known filename: wuweb.dll
info link:
info source: Safer Networking Ltd.
Path: E:\WINDOWS\SysWow64\
Long name: wuweb.dll
Short name:
Date (created): 28/07/2008 09:11:00
Date (last access): 13/10/2008 10:09:50
Date (last write): 18/07/2008 22:09:44
Filesize: 205000
Attributes: archive
MD5: 4889720E56E85E1FE4659039BB5F6E3F
CRC32: EE278BD5
Version: 7.2.6001.784
{7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist))
DPF name:
CLSID name: Microsoft RDP Client Control (redist)
Installer: E:\WINDOWS\Downloaded Program Files\msrdp.inf
Codebase: https://81.86.26.166/Remote/msrdp.cab
description:
classification: Legitimate
known filename: msrdp.ocx
info link:
info source: Safer Networking Ltd.
Path: E:\WINDOWS\Downloaded Program Files\
Long name: msrdp.ocx
Short name:
Date (created): 24/03/2005 16:27:26
Date (last access): 24/09/2008 12:42:20
Date (last write): 24/03/2005 16:27:26
Filesize: 754176
Attributes: archive
MD5: 9622600F464AE6AE99B44BD0CF58A52F
CRC32: 836C96CA
Version: 5.2.3790.1830
{8FFBE65D-2C9C-4669-84BD-5829DC0B603C} ()
DPF name:
CLSID name:
Installer: E:\WINDOWS\Downloaded Program Files\erma.inf
Codebase: http://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
description:
classification: Open for discussion
known filename:
info link:
info source: Safer Networking Ltd.
{D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object)
DPF name:
CLSID name: Shockwave Flash Object
Installer: E:\WINDOWS\Downloaded Program Files\swflash.inf
Codebase: http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
description: Macromedia Shockwave Flash Player
classification: Legitimate
known filename:
info link:
info source: Patrick M. Kolla
Path: E:\WINDOWS\SysWow64\Macromed\Flash\
Long name: Flash9f.ocx
Short name:
Date (created): 25/03/2008 03:32:42
Date (last access): 13/10/2008 08:51:46
Date (last write): 25/03/2008 03:32:42
Filesize: 2991488
Attributes: readonly archive
MD5: 48FDF435B8595604E54125B321924510
CRC32: 12335E29
Version: 9.0.124.0
--- Process list ---
PID: 0 ( 0) [System]
PID: 1280 ( 424) E:\Program Files (x86)\Bonjour\mDNSResponder.exe
size: 229376
MD5: 73686FE0B2E0469F89FD2075BE724704
PID: 1532 ( 424) e:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
size: 29178224
MD5: D07C9575726797B0E9069E1108A1C483
PID: 1644 ( 424) e:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe
size: 242544
MD5: D2B096CD2F56FAC6EEEED9A77DDF6DC8
PID: 2368 (2236) E:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
size: 68856
MD5: E616A6A6E91B0A86F2F6217CDE835FFE
PID: 1600 (2236) E:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe
size: 4891472
MD5: 3B1B5D09D3C9C4CD39D4DB06ED7A0855
PID: 936 (3064) E:\Program Files\Alwil Software\Avast4\ashSimpl.exe
size: 155832
MD5: EF2CB30A6C64A0CEAF60839C531A2207
PID: 2052 ( 424) E:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
size: 322120
MD5: 11F714F85530A2BD134074DC30E99FCA
PID: 2556 ( 936) E:\WINDOWS\system32\ctfmon.exe
size: 15360
MD5: 07C627121E84C7EBF7E38E3A1DBCDEC3
PID: 4 ( 0) System
PID: 304 ( 4) E:\WINDOWS\system32\smss.exe
size: 53760
MD5: 97E9B4A202E645E7826BE7597B335C47
PID: 352 ( 304) E:\WINDOWS\system32\csrss.exe
PID: 376 ( 304) E:\WINDOWS\system32\winlogon.exe
PID: 424 ( 376) E:\WINDOWS\system32\services.exe
PID: 436 ( 376) E:\WINDOWS\system32\lsass.exe
PID: 608 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 680 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 724 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 772 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 808 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 1192 ( 424) E:\WINDOWS\system32\spoolsv.exe
size: 110080
MD5: 5918677301E62A935A837EC22BA7088C
PID: 1328 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 1432 ( 424) E:\WINDOWS\system32\inetsrv\inetinfo.exe
PID: 1604 ( 424) E:\WINDOWS\system32\nvsvc64.exe
PID: 1668 ( 424) E:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
size: 156016
MD5: 582F8B13E1042C49A4A5A7BB52F518E4
PID: 1724 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 1960 ( 424) E:\WINDOWS\system32\svchost.exe
size: 14848
MD5: C09CCFE81DEC9B162533D7184D705682
PID: 2236 (2188) E:\WINDOWS\explorer.exe
size: 1364480
MD5: AE7A08C05F72A9242734C03230A5CD7F
PID: 2244 ( 608) E:\WINDOWS\system32\wbem\wmiprvse.exe
size: 207872
MD5: CE7B5D3CB3682435725CAB1C4D9FB145
PID: 2668 ( 424) E:\WINDOWS\system32\alg.exe
size: 45056
MD5: FD79AFA46B60D32557CB62F6050C2B69
PID: 2176 (2236) E:\WINDOWS\system32\ctfmon.exe
size: 15360
MD5: 07C627121E84C7EBF7E38E3A1DBCDEC3
PID: 2160 (2236) E:\Program Files\Logitech\SetPoint\SetPoint.exe
size: 1196048
MD5: 834E71F5767213C87976680AACF4ACEE
PID: 2472 ( 376) E:\WINDOWS\system32\taskmgr.exe
size: 168960
MD5: 96BB332BF16E25EF3081491B55FA0F9F
PID: 288 ( 724) E:\WINDOWS\system32\wuauclt.exe
--- Browser start & search pages list ---
Spybot - Search & Destroy browser pages report, 13/10/2008 10:18:46
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
E:\WINDOWS\system32\blank.htm
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.akroservices.co.uk/
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
%SystemRoot%\system32\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
http://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
http://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\CustomizeSearch
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm
--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip
Protocol 1: MSAFD Tcpip [UDP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip
Protocol 2: MSAFD Tcpip [RAW/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip
Protocol 3: RSVP UDP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Protocol 4: RSVP TCP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Namespace Provider 0: Tcpip
GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B}
Filename: %SystemRoot%\System32\mswsock.dll
Description: Microsoft Windows NT/2k/XP TCP/IP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: TCP/IP
Namespace Provider 1: NTDS
GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC}
Filename: %SystemRoot%\System32\winrnr.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\winrnr.dll
DB protocol: NTDS
Namespace Provider 2: Network Location Awareness (NLA) Namespace
GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83}
Filename: %SystemRoot%\System32\mswsock.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: NLA-Namespace
Namespace Provider 3: mdnsNSP
GUID: {B600E6E9-553B-4A19-8696-335E5C896153}
Filename: E:\Program Files (x86)\Bonjour\mdnsNSP.dll
Description: Apple Rendezvous protocol
DB filename: %ProgramFiles%\Rendezvous\bin\mdnsNSP.dll
DB protocol: mdnsNSP