dilan_thomas
New member
I would like to bore you with pointless information about how frustrated I am...I'm frustrated...That was fun. Now moving right along...
I have spybot S&D 1.4. I have updated it, but cannot download 1.5 because my computer already has a virus. Spybot will not fix Command Service. I have tried to download HiJackThis, but haven't been successful. I will copy to disk tonight and take to infected computer tomorrow in necessary. In the meantime...
Can I just by RegCure for $30 and be done with this? Here is my log from Spybot.
Command Service: Library (File, fixed)
C:\WINNT\system32\atmtd.dll._
Command Service: Settings (Registry key, fixing failed) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cmdService
Command Service: Settings (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cmdService
Clickbank: Tracking cookie (Internet Explorer: Administrator) (Cookie, fixed)
--- Spybot - Search & Destroy version: 1.4 (build: 20050523) ---
2006-05-17 unins000.exe (51.41.0.0)
2005-05-31 SpybotSD.exe (1.4.0.3)
2007-08-31 blindman.exe (1.0.0.6)
2007-08-31 TeaTimer.exe (1.5.0.9)
2007-08-31 Update.exe (1.4.0.5)
2005-05-31 aports.dll (2.1.0.0)
2005-05-31 borlndmm.dll (7.0.4.453)
2005-05-31 delphimm.dll (7.0.4.453)
2005-05-31 SDHelper.dll (1.4.0.0)
2005-05-31 UnzDll.dll (1.73.1.1)
2005-05-31 ZipDll.dll (1.73.2.0)
2007-05-23 advcheck.dll (1.5.3.0)
2007-07-31 Tools.dll (2.1.2.0)
2007-10-31 Includes\Dialer.sbi (*)
2007-11-07 Includes\Hijackers.sbi (*)
2007-10-04 Includes\Keyloggers.sbi (*)
2007-11-07 Includes\Malware.sbi (*)
2007-10-24 Includes\PUPS.sbi (*)
2007-05-30 Includes\Security.sbi (*)
2007-11-07 Includes\Spybots.sbi (*)
2007-11-07 Includes\Trojans.sbi (*)
2007-11-07 Includes\Cookies.sbi (*)
2007-11-07 Includes\Revision.sbi (*)
2007-11-06 Includes\Tracks.uti
2007-11-07 Includes\TrojansC.sbi (*)
2007-11-07 Includes\SpybotsC.sbi (*)
2007-11-07 Includes\SecurityC.sbi (*)
2007-11-07 Includes\PUPSC.sbi (*)
2007-11-07 Includes\MalwareC.sbi (*)
2007-11-07 Includes\KeyloggersC.sbi (*)
2007-11-07 Includes\HijackersC.sbi (*)
2007-11-07 Includes\DialerC.sbi (*)
2007-06-06 Plugins\TCPIPAddress.dll
--- System information ---
Windows 2000 (Build: 2195) Service Pack 4
/ Windows 2000 / SP4: Windows 2000 Service Pack 4
--- Startup entries list ---
Located: HK_LM:Run, IndexSearch
command: "C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe"
file: C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe
size: 40960
MD5: 71b5d6309a8ac83f6e63358ff2350284
Located: HK_LM:Run, ntdll.dll
command: "C:\Program Files\QuickTime\qttask.exe" -atboottime
file: C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: fa7eb9aff3d726a6bf0494bee7e378f6
Located: HK_LM:Run, PaperPort PTD
command: "C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe"
file: C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
size: 36864
MD5: 8d4f45f50f40e50a2b625ef3eeba8eb1
Located: HK_LM:Run, Picasa Media Detector
command: C:\Program Files\Picasa2\PicasaMediaDetector.exe
file: C:\Program Files\Picasa2\PicasaMediaDetector.exe
size: 366400
MD5: 04717bf0c76a6dd9fa3df1560e5d3a42
Located: HK_LM:Run, QuickTime Task
command: "C:\Program Files\QuickTime\qttask.exe" -atboottime
file: C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: fa7eb9aff3d726a6bf0494bee7e378f6
Located: HK_LM:Run, runner1
command: C:\WINNT\mrofinu1000106.exe 61A847B5BBF72813329B385772FF01F0B3E35B6638993F4661AA4EBD86D67C56389B284534F310
file:
Located: HK_LM:Run, Smapp
command: Smtray.exe
file: C:\WINNT\system32\Smtray.exe
size: 229376
MD5: 9236534e177a694c6101a068ea2cb1a6
Located: HK_LM:Run, SSBkgdUpdate
command: "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
file: C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe
size: 155648
MD5: 1c3ca3e7807f915933bb4e08e599ddab
Located: HK_LM:Run, SunJavaUpdateSched
command: "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
file: C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
size: 132496
MD5: d4f0f7437327dbaa264338baafb5e5af
Located: HK_LM:Run, Synchronization Manager
command: mobsync.exe /logon
file: C:\WINNT\system32\mobsync.exe
size: 111376
MD5: 9b2f5b9e745deaaa57fb78329ed03061
Located: HK_LM:Run, tourpath
command: regedit /s c:\winnt\tour.reg
file:
Located: HK_CU:Run, ctfmon.exe
command: ctfmon.exe
file:
Located: HK_CU:Run, Insider
command: C:\Program Files\Insider\Insider.exe
file: C:\Program Files\Insider\Insider.exe
size: 136192
MD5: edc71bb21ac2b8a30fbc20a3a1ca59aaa
Located: Startup (common), Adobe Reader Speed Launch.lnk
command: C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
file: C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
size: 29696
MD5: 43362b96870ce8649f4f2ec893da93f0
Located: Startup (common), AUTOCHK.LNK
command: C:\CFGSAFE\AUTOCHK.EXE
file: C:\CFGSAFE\AUTOCHK.EXE
size: 11808
MD5: a7689e6778ebbfa7189efce39d24f1a8
Located: Startup (common), Microsoft Office.lnk
command: C:\Program Files\Microsoft Office\Office10\OSA.EXE
file: C:\Program Files\Microsoft Office\Office10\OSA.EXE
size: 83360
MD5: 5bc65464354a9fd3beaa28e18839734a
Located: System.ini, crypt32chain
command: crypt32.dll
file: crypt32.dll
Located: System.ini, cryptnet
command: cryptnet.dll
file: cryptnet.dll
Located: System.ini, cscdll
command: cscdll.dll
file: cscdll.dll
Located: System.ini, pmnoopq
command: pmnoopq.dll
file: pmnoopq.dll
Located: System.ini, sclgntfy
command: sclgntfy.dll
file: sclgntfy.dll
Located: System.ini, SensLogn
command: WlNotify.dll
file: WlNotify.dll
Located: System.ini, wzcnotif
command: wzcdlg.dll
file: wzcdlg.dll
--- Browser helper object list ---
{1C1DD717-53B2-485E-A17B-C9977C205E10} ()
BHO name:
CLSID name:
Path: C:\WINNT\System32\
Long name: pmnoopq.dll
Short name:
Date (created): 11/9/2007 8:18:08 AM
Date (last access): 11/10/2007
Date (last write): 11/9/2007 8:18:08 AM
Filesize: 35328
Attributes: archive
MD5: 2A82CD00CC4A8076393520D43190A1E5
CRC32: 3BA2592B
{8206B86D-8AAD-41A6-1D98-84EDC09CC0A2} (0)
BHO name: 0
CLSID name:
Path: C:\Program Files\Outlook Express\
Long name: sajubusak531.dll
Short name: SABA48~1.DLL
Date (created): 11/10/2007 11:57:40 AM
Date (last access): 11/10/2007
Date (last write): 11/10/2007 11:57:40 AM
Filesize: 70144
Attributes: archive
MD5: 39D8FEB675241490403CBD33A7C14159
CRC32: 9DD5EBB1
{8A636CBA-5FE3-46F8-8AD3-9915D3E8C88A} ()
BHO name:
CLSID name:
Path: C:\Program Files\Windows Media Player\
Long name: poweher83122.dll
Short name: POWEHE~1.DLL
Date (created): 8/2/2007 5:44:00 AM
Date (last access): 11/10/2007
Date (last write): 8/2/2007 5:44:00 AM
Filesize: 282624
Attributes: archive
MD5: 0B36BD26E49F50029B240EF4C5F2F729
CRC32: 73A2E000
{A6AAA2F0-2D5A-4896-BBCC-1DFD5AECCA6C} ()
BHO name:
CLSID name:
Path: C:\Program Files\Windows Media Player\
Long name: poweher4444.dll
Short name: POWEHE~2.DLL
Date (created): 8/2/2007 5:44:00 AM
Date (last access): 11/10/2007
Date (last write): 8/2/2007 5:44:00 AM
Filesize: 282624
Attributes: archive
MD5: 0B36BD26E49F50029B240EF4C5F2F729
CRC32: 73A2E003
{CFE906A1-EB71-49A9-B92A-9E4A6C167773} ()
BHO name:
CLSID name:
Path: C:\WINNT\System32\
Long name: awvtt.dll
Short name:
Date (created): 11/9/2007 8:23:16 AM
Date (last access): 11/10/2007
Date (last write): 11/9/2007 8:23:28 AM
Filesize: 315488
Attributes: archive
MD5: 6D06BE455B5C8EBC493B8D0E1E89A86C
CRC32: 676BDB1F
--- ActiveX list ---
{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 1.6.0_03
Installer:
Codebase: http://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
Path: C:\Program Files\Java\jre1.6.0_03\bin\
Long name: npjpi160_03.dll
Short name: NPJPI1~1.DLL
Date (created): 9/24/2007 11:31:44 PM
Date (last access): 11/9/2007
Date (last write): 9/25/2007 1:11:34 AM
Filesize: 132496
Attributes: archive
MD5: D6A4682A6FF41832A3F1A7AB9AE08199
CRC32: 9080B537
Version: 6.0.30.5
--- Process list ---
PID: 0 ( 0) [System]
PID: 136 ( 8) \SystemRoot\System32\smss.exe
PID: 160 ( 136) \??\C:\WINNT\system32\csrss.exe
PID: 180 ( 136) \??\C:\WINNT\system32\winlogon.exe
PID: 208 ( 180) C:\WINNT\system32\services.exe
size: 89360
MD5: CFED2D28F5B8A24127E9E06043070643
PID: 220 ( 180) C:\WINNT\system32\lsass.exe
size: 33552
MD5: 271229760CCED993E9E7CAB1C7274134
PID: 412 ( 208) C:\WINNT\system32\svchost.exe
size: 7952
MD5: 9E64AD53CFD9DA2D22E8A924F8C6E62C
PID: 436 ( 208) C:\WINNT\system32\spoolsv.exe
size: 45328
MD5: 987DAF317B917CFC973DE8364D62A76C
PID: 464 ( 208) C:\PROGRA~1\NETWOR~1\VIRUSS~1\Avsynmgr.exe
size: 155665
MD5: DE1A9DDD66FAAA71E4E2494FBC970CB7
PID: 476 ( 208) C:\WINNT\QURQIENsaWVudA\command.exe
size: 293888
MD5: 3E2C234DDE711C6754F2DF994FB3CC94
PID: 496 ( 208) C:\WINNT\System32\svchost.exe
size: 7952
MD5: 9E64AD53CFD9DA2D22E8A924F8C6E62C
PID: 552 ( 208) C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
size: 270336
MD5: DF631667AC107A56FBD3F111577ECD80
PID: 636 ( 208) C:\WINNT\System32\NMSSvc.exe
size: 1036288
MD5: BB687A703C6944FB0678772F9EC33D20
PID: 672 ( 208) C:\WINNT\system32\regsvc.exe
size: 68368
MD5: 250C4CE389783FA2398E3AFA4317008C
PID: 692 ( 208) C:\WINNT\system32\MSTask.exe
size: 119568
MD5: 00D8C428B2D6DFFCABEB859BC69F632B
PID: 704 ( 464) C:\PROGRA~1\NETWOR~1\VIRUSS~1\VsStat.exe
size: 90129
MD5: 16847187B542113E8FDF4383A6FD489D
PID: 744 ( 208) C:\WINNT\System32\WBEM\WinMgmt.exe
size: 196706
MD5: 05B2001E1BC653FD6091E741B46F71B4
PID: 796 ( 704) C:\PROGRA~1\NETWOR~1\VIRUSS~1\Vshwin32.exe
size: 114705
MD5: ACBCB66344F31C1D51D8C03F310DE468
PID: 820 ( 208) C:\WINNT\System32\mspmspsv.exe
size: 53520
MD5: 5B6DA8F4F5047D6DF51E1C38FC57D4D9
PID: 832 ( 208) C:\WINNT\system32\svchost.exe
size: 7952
MD5: 9E64AD53CFD9DA2D22E8A924F8C6E62C
PID: 856 ( 464) C:\PROGRA~1\NETWOR~1\VIRUSS~1\Avconsol.exe
size: 172049
MD5: ED760A385B7C7115C41A12F2692E5D50
PID: 912 ( 208) C:\PROGRA~1\COMMON~1\NETWOR~1\McShield\Mcshield.exe
size: 221261
MD5: 73D5892583E9E816E78E9C0CD37A539A
PID: 1208 (1192) C:\WINNT\Explorer.EXE
size: 243472
MD5: 59CF2B7DCED9111F48F51B4B570E672D
PID: 1352 (1208) C:\WINNT\system32\Smtray.exe
size: 229376
MD5: 9236534E177A694C6101A068EA2CB1A6
PID: 1092 (1208) C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
size: 132496
MD5: D4F0F7437327DBAA264338BAAFB5E5AF
PID: 1360 (1208) C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
size: 36864
MD5: 8D4F45F50F40E50A2B625EF3EEBA8EB1
PID: 1396 (1208) C:\Program Files\Picasa2\PicasaMediaDetector.exe
size: 366400
MD5: 04717BF0C76A6DD9FA3DF1560E5D3A42
PID: 1344 (1208) C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: FA7EB9AFF3D726A6BF0494BEE7E378F6
PID: 1312 (1208) C:\Program Files\Insider\Insider.exe
size: 136192
MD5: EDC71BB21AC2B8A30FBC20A3A1CA59AA
PID: 1440 (1208) C:\CFGSAFE\AUTOCHK.EXE
size: 11808
MD5: A7689E6778EBBFA7189EFCE39D24F1A8
PID: 1492 (1428) C:\Program Files\Java\jre1.6.0_03\bin\javaw.exe
size: 135168
MD5: 80D62C1F4C24794FF54CFE2F98BB307E
PID: 1504 (1208) C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
size: 4393096
MD5: 09CA174A605B480318731E691DC98539
PID: 1364 (1208) C:\Program Files\Reflection\r2win.exe
size: 2351104
MD5: A020C2C9A4A4B18D013D793B5906B9DA
PID: 8 ( 0) System
--- Browser start & search pages list ---
Spybot - Search & Destroy browser pages report, 11/10/2007 12:19:48 PM
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
C:\WINNT\System32\blank.htm
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.google.com
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.google.com/ig?hl=en
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\@
http://www.google.com/search?q=%s
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
%SystemRoot%\system32\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\CustomizeSearch
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm
--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\msafd.
I have spybot S&D 1.4. I have updated it, but cannot download 1.5 because my computer already has a virus. Spybot will not fix Command Service. I have tried to download HiJackThis, but haven't been successful. I will copy to disk tonight and take to infected computer tomorrow in necessary. In the meantime...
Can I just by RegCure for $30 and be done with this? Here is my log from Spybot.
Command Service: Library (File, fixed)
C:\WINNT\system32\atmtd.dll._
Command Service: Settings (Registry key, fixing failed) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cmdService
Command Service: Settings (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cmdService
Clickbank: Tracking cookie (Internet Explorer: Administrator) (Cookie, fixed)
--- Spybot - Search & Destroy version: 1.4 (build: 20050523) ---
2006-05-17 unins000.exe (51.41.0.0)
2005-05-31 SpybotSD.exe (1.4.0.3)
2007-08-31 blindman.exe (1.0.0.6)
2007-08-31 TeaTimer.exe (1.5.0.9)
2007-08-31 Update.exe (1.4.0.5)
2005-05-31 aports.dll (2.1.0.0)
2005-05-31 borlndmm.dll (7.0.4.453)
2005-05-31 delphimm.dll (7.0.4.453)
2005-05-31 SDHelper.dll (1.4.0.0)
2005-05-31 UnzDll.dll (1.73.1.1)
2005-05-31 ZipDll.dll (1.73.2.0)
2007-05-23 advcheck.dll (1.5.3.0)
2007-07-31 Tools.dll (2.1.2.0)
2007-10-31 Includes\Dialer.sbi (*)
2007-11-07 Includes\Hijackers.sbi (*)
2007-10-04 Includes\Keyloggers.sbi (*)
2007-11-07 Includes\Malware.sbi (*)
2007-10-24 Includes\PUPS.sbi (*)
2007-05-30 Includes\Security.sbi (*)
2007-11-07 Includes\Spybots.sbi (*)
2007-11-07 Includes\Trojans.sbi (*)
2007-11-07 Includes\Cookies.sbi (*)
2007-11-07 Includes\Revision.sbi (*)
2007-11-06 Includes\Tracks.uti
2007-11-07 Includes\TrojansC.sbi (*)
2007-11-07 Includes\SpybotsC.sbi (*)
2007-11-07 Includes\SecurityC.sbi (*)
2007-11-07 Includes\PUPSC.sbi (*)
2007-11-07 Includes\MalwareC.sbi (*)
2007-11-07 Includes\KeyloggersC.sbi (*)
2007-11-07 Includes\HijackersC.sbi (*)
2007-11-07 Includes\DialerC.sbi (*)
2007-06-06 Plugins\TCPIPAddress.dll
--- System information ---
Windows 2000 (Build: 2195) Service Pack 4
/ Windows 2000 / SP4: Windows 2000 Service Pack 4
--- Startup entries list ---
Located: HK_LM:Run, IndexSearch
command: "C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe"
file: C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe
size: 40960
MD5: 71b5d6309a8ac83f6e63358ff2350284
Located: HK_LM:Run, ntdll.dll
command: "C:\Program Files\QuickTime\qttask.exe" -atboottime
file: C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: fa7eb9aff3d726a6bf0494bee7e378f6
Located: HK_LM:Run, PaperPort PTD
command: "C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe"
file: C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
size: 36864
MD5: 8d4f45f50f40e50a2b625ef3eeba8eb1
Located: HK_LM:Run, Picasa Media Detector
command: C:\Program Files\Picasa2\PicasaMediaDetector.exe
file: C:\Program Files\Picasa2\PicasaMediaDetector.exe
size: 366400
MD5: 04717bf0c76a6dd9fa3df1560e5d3a42
Located: HK_LM:Run, QuickTime Task
command: "C:\Program Files\QuickTime\qttask.exe" -atboottime
file: C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: fa7eb9aff3d726a6bf0494bee7e378f6
Located: HK_LM:Run, runner1
command: C:\WINNT\mrofinu1000106.exe 61A847B5BBF72813329B385772FF01F0B3E35B6638993F4661AA4EBD86D67C56389B284534F310
file:
Located: HK_LM:Run, Smapp
command: Smtray.exe
file: C:\WINNT\system32\Smtray.exe
size: 229376
MD5: 9236534e177a694c6101a068ea2cb1a6
Located: HK_LM:Run, SSBkgdUpdate
command: "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
file: C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe
size: 155648
MD5: 1c3ca3e7807f915933bb4e08e599ddab
Located: HK_LM:Run, SunJavaUpdateSched
command: "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
file: C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
size: 132496
MD5: d4f0f7437327dbaa264338baafb5e5af
Located: HK_LM:Run, Synchronization Manager
command: mobsync.exe /logon
file: C:\WINNT\system32\mobsync.exe
size: 111376
MD5: 9b2f5b9e745deaaa57fb78329ed03061
Located: HK_LM:Run, tourpath
command: regedit /s c:\winnt\tour.reg
file:
Located: HK_CU:Run, ctfmon.exe
command: ctfmon.exe
file:
Located: HK_CU:Run, Insider
command: C:\Program Files\Insider\Insider.exe
file: C:\Program Files\Insider\Insider.exe
size: 136192
MD5: edc71bb21ac2b8a30fbc20a3a1ca59aaa
Located: Startup (common), Adobe Reader Speed Launch.lnk
command: C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
file: C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
size: 29696
MD5: 43362b96870ce8649f4f2ec893da93f0
Located: Startup (common), AUTOCHK.LNK
command: C:\CFGSAFE\AUTOCHK.EXE
file: C:\CFGSAFE\AUTOCHK.EXE
size: 11808
MD5: a7689e6778ebbfa7189efce39d24f1a8
Located: Startup (common), Microsoft Office.lnk
command: C:\Program Files\Microsoft Office\Office10\OSA.EXE
file: C:\Program Files\Microsoft Office\Office10\OSA.EXE
size: 83360
MD5: 5bc65464354a9fd3beaa28e18839734a
Located: System.ini, crypt32chain
command: crypt32.dll
file: crypt32.dll
Located: System.ini, cryptnet
command: cryptnet.dll
file: cryptnet.dll
Located: System.ini, cscdll
command: cscdll.dll
file: cscdll.dll
Located: System.ini, pmnoopq
command: pmnoopq.dll
file: pmnoopq.dll
Located: System.ini, sclgntfy
command: sclgntfy.dll
file: sclgntfy.dll
Located: System.ini, SensLogn
command: WlNotify.dll
file: WlNotify.dll
Located: System.ini, wzcnotif
command: wzcdlg.dll
file: wzcdlg.dll
--- Browser helper object list ---
{1C1DD717-53B2-485E-A17B-C9977C205E10} ()
BHO name:
CLSID name:
Path: C:\WINNT\System32\
Long name: pmnoopq.dll
Short name:
Date (created): 11/9/2007 8:18:08 AM
Date (last access): 11/10/2007
Date (last write): 11/9/2007 8:18:08 AM
Filesize: 35328
Attributes: archive
MD5: 2A82CD00CC4A8076393520D43190A1E5
CRC32: 3BA2592B
{8206B86D-8AAD-41A6-1D98-84EDC09CC0A2} (0)
BHO name: 0
CLSID name:
Path: C:\Program Files\Outlook Express\
Long name: sajubusak531.dll
Short name: SABA48~1.DLL
Date (created): 11/10/2007 11:57:40 AM
Date (last access): 11/10/2007
Date (last write): 11/10/2007 11:57:40 AM
Filesize: 70144
Attributes: archive
MD5: 39D8FEB675241490403CBD33A7C14159
CRC32: 9DD5EBB1
{8A636CBA-5FE3-46F8-8AD3-9915D3E8C88A} ()
BHO name:
CLSID name:
Path: C:\Program Files\Windows Media Player\
Long name: poweher83122.dll
Short name: POWEHE~1.DLL
Date (created): 8/2/2007 5:44:00 AM
Date (last access): 11/10/2007
Date (last write): 8/2/2007 5:44:00 AM
Filesize: 282624
Attributes: archive
MD5: 0B36BD26E49F50029B240EF4C5F2F729
CRC32: 73A2E000
{A6AAA2F0-2D5A-4896-BBCC-1DFD5AECCA6C} ()
BHO name:
CLSID name:
Path: C:\Program Files\Windows Media Player\
Long name: poweher4444.dll
Short name: POWEHE~2.DLL
Date (created): 8/2/2007 5:44:00 AM
Date (last access): 11/10/2007
Date (last write): 8/2/2007 5:44:00 AM
Filesize: 282624
Attributes: archive
MD5: 0B36BD26E49F50029B240EF4C5F2F729
CRC32: 73A2E003
{CFE906A1-EB71-49A9-B92A-9E4A6C167773} ()
BHO name:
CLSID name:
Path: C:\WINNT\System32\
Long name: awvtt.dll
Short name:
Date (created): 11/9/2007 8:23:16 AM
Date (last access): 11/10/2007
Date (last write): 11/9/2007 8:23:28 AM
Filesize: 315488
Attributes: archive
MD5: 6D06BE455B5C8EBC493B8D0E1E89A86C
CRC32: 676BDB1F
--- ActiveX list ---
{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 1.6.0_03
Installer:
Codebase: http://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
Path: C:\Program Files\Java\jre1.6.0_03\bin\
Long name: npjpi160_03.dll
Short name: NPJPI1~1.DLL
Date (created): 9/24/2007 11:31:44 PM
Date (last access): 11/9/2007
Date (last write): 9/25/2007 1:11:34 AM
Filesize: 132496
Attributes: archive
MD5: D6A4682A6FF41832A3F1A7AB9AE08199
CRC32: 9080B537
Version: 6.0.30.5
--- Process list ---
PID: 0 ( 0) [System]
PID: 136 ( 8) \SystemRoot\System32\smss.exe
PID: 160 ( 136) \??\C:\WINNT\system32\csrss.exe
PID: 180 ( 136) \??\C:\WINNT\system32\winlogon.exe
PID: 208 ( 180) C:\WINNT\system32\services.exe
size: 89360
MD5: CFED2D28F5B8A24127E9E06043070643
PID: 220 ( 180) C:\WINNT\system32\lsass.exe
size: 33552
MD5: 271229760CCED993E9E7CAB1C7274134
PID: 412 ( 208) C:\WINNT\system32\svchost.exe
size: 7952
MD5: 9E64AD53CFD9DA2D22E8A924F8C6E62C
PID: 436 ( 208) C:\WINNT\system32\spoolsv.exe
size: 45328
MD5: 987DAF317B917CFC973DE8364D62A76C
PID: 464 ( 208) C:\PROGRA~1\NETWOR~1\VIRUSS~1\Avsynmgr.exe
size: 155665
MD5: DE1A9DDD66FAAA71E4E2494FBC970CB7
PID: 476 ( 208) C:\WINNT\QURQIENsaWVudA\command.exe
size: 293888
MD5: 3E2C234DDE711C6754F2DF994FB3CC94
PID: 496 ( 208) C:\WINNT\System32\svchost.exe
size: 7952
MD5: 9E64AD53CFD9DA2D22E8A924F8C6E62C
PID: 552 ( 208) C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
size: 270336
MD5: DF631667AC107A56FBD3F111577ECD80
PID: 636 ( 208) C:\WINNT\System32\NMSSvc.exe
size: 1036288
MD5: BB687A703C6944FB0678772F9EC33D20
PID: 672 ( 208) C:\WINNT\system32\regsvc.exe
size: 68368
MD5: 250C4CE389783FA2398E3AFA4317008C
PID: 692 ( 208) C:\WINNT\system32\MSTask.exe
size: 119568
MD5: 00D8C428B2D6DFFCABEB859BC69F632B
PID: 704 ( 464) C:\PROGRA~1\NETWOR~1\VIRUSS~1\VsStat.exe
size: 90129
MD5: 16847187B542113E8FDF4383A6FD489D
PID: 744 ( 208) C:\WINNT\System32\WBEM\WinMgmt.exe
size: 196706
MD5: 05B2001E1BC653FD6091E741B46F71B4
PID: 796 ( 704) C:\PROGRA~1\NETWOR~1\VIRUSS~1\Vshwin32.exe
size: 114705
MD5: ACBCB66344F31C1D51D8C03F310DE468
PID: 820 ( 208) C:\WINNT\System32\mspmspsv.exe
size: 53520
MD5: 5B6DA8F4F5047D6DF51E1C38FC57D4D9
PID: 832 ( 208) C:\WINNT\system32\svchost.exe
size: 7952
MD5: 9E64AD53CFD9DA2D22E8A924F8C6E62C
PID: 856 ( 464) C:\PROGRA~1\NETWOR~1\VIRUSS~1\Avconsol.exe
size: 172049
MD5: ED760A385B7C7115C41A12F2692E5D50
PID: 912 ( 208) C:\PROGRA~1\COMMON~1\NETWOR~1\McShield\Mcshield.exe
size: 221261
MD5: 73D5892583E9E816E78E9C0CD37A539A
PID: 1208 (1192) C:\WINNT\Explorer.EXE
size: 243472
MD5: 59CF2B7DCED9111F48F51B4B570E672D
PID: 1352 (1208) C:\WINNT\system32\Smtray.exe
size: 229376
MD5: 9236534E177A694C6101A068EA2CB1A6
PID: 1092 (1208) C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
size: 132496
MD5: D4F0F7437327DBAA264338BAAFB5E5AF
PID: 1360 (1208) C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
size: 36864
MD5: 8D4F45F50F40E50A2B625EF3EEBA8EB1
PID: 1396 (1208) C:\Program Files\Picasa2\PicasaMediaDetector.exe
size: 366400
MD5: 04717BF0C76A6DD9FA3DF1560E5D3A42
PID: 1344 (1208) C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: FA7EB9AFF3D726A6BF0494BEE7E378F6
PID: 1312 (1208) C:\Program Files\Insider\Insider.exe
size: 136192
MD5: EDC71BB21AC2B8A30FBC20A3A1CA59AA
PID: 1440 (1208) C:\CFGSAFE\AUTOCHK.EXE
size: 11808
MD5: A7689E6778EBBFA7189EFCE39D24F1A8
PID: 1492 (1428) C:\Program Files\Java\jre1.6.0_03\bin\javaw.exe
size: 135168
MD5: 80D62C1F4C24794FF54CFE2F98BB307E
PID: 1504 (1208) C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
size: 4393096
MD5: 09CA174A605B480318731E691DC98539
PID: 1364 (1208) C:\Program Files\Reflection\r2win.exe
size: 2351104
MD5: A020C2C9A4A4B18D013D793B5906B9DA
PID: 8 ( 0) System
--- Browser start & search pages list ---
Spybot - Search & Destroy browser pages report, 11/10/2007 12:19:48 PM
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
C:\WINNT\System32\blank.htm
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.google.com
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.google.com/ig?hl=en
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\@
http://www.google.com/search?q=%s
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
%SystemRoot%\system32\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\CustomizeSearch
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm
--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\msafd.