Spyware help needed. HijackThis and HouseCall logs included.

Discussion in 'Windows - Virus and spyware problems' started by bilcal7, Sep 30, 2008.

  1. bilcal7

    bilcal7 Member

    Joined:
    Sep 30, 2008
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    11
    Everytime I click on a folder such as 'my documents' or 'my music' I get the message that says:

    Windows Explorer has encountered a problem and needs to close. We are sorry for the inconvenience.

    I also sometimes get:

    DrWatson Postmortem Debugger has encountered a problem and needs to close. We are sorry for the inconvenience.

    And I also think I might have a related problem which is whenever I open a .doc I get:

    Microsoft Visual Basic: Subscript out of range.


    Can anyone help me on this problem? I copied my Trend Micro HouseCall results and my HijackThis Log:

    Transfering Data...

    About...



    Results



    Ticket



    Encyclopedia

    Collecting scan results...
    Detected malware

    Note: Complete removal of the malware listed below failed! If you require general hints and tips to solve the problem, please click here. Malware specific information is available from the relevant malware section.
    TITLE_OF_MALWARE
    0 Infections

    Transfering more information about this malware...
    General information about this type of malware.
    There is currently no more information available for this malware...
    General information about this type of malware.
    Aliasnames: no more aliase names known
    Platform: Not specified
    First occurence: Not specified
    General risk rate Very lowLowMediumHigh
    General information about this type of malware.

    Some infections of this malware could not be removed automatically! You can manually select "Remove" and perform another "cleanup" to try and solve this problem.
    Alternatively, you may click here to receive detailed instructions on how to remove these infections manually.
    Cleanup options Clean all detected Infections automatically
    Select an individual action for each detected infection.
    Infected operating systemChecking this line will take no action on the infection Checking this column will clean the infectionWarning: Checking this column will delete the infection (e.g. the infected file) from your hard disk.Files infected by this malwareThis will display all the files infected by the above malware.ReasonThis column indicates the reason why cleanup failed.The system denied access to the fileThe current pattern does not support cleanup
    Detected signatures
    EICAR signature
    0 Signatures
    The detected signature is not a security risk; it is designed to test antivirus scanners. The listed files are not infected. They only contain the EICAR signature.
    Take no action on signatures on the machineDelete signatures. Warning! Deleting this column will remove all associated signature files.EICAR filesThis will display all file paths of the above signatureReasonno accessnot supported
    Detected grayware/spyware

    Note: Complete removal of the grayware listed below failed! If you require general hints and tips to solve the problem, please click here. Grayware specific information is available from the relevant grayware section.
    TITLE_OF_GRAYWARE
    0 Infections

    Transfering information about this grayware/spyware...
    General information about this type of grayware/spyware.
    There is currently no more information available for this grayware/spyware...
    General information about this type of grayware/spyware.
    Aliasnames: no more aliase names known
    Platform: Not specified
    First occurence: Not specified
    General risk rate Very lowLowMediumHigh
    General information about this type of grayware/spyware.

    Some infections of this grayware/spyware could not be removed automatically!
    Click here to receive instructions on how to remove this type of infection manually.
    Cleanup options Clean all detected infections automatically
    Select an individual action for each detected infection
    Files infected by this grayware/spywareSelecting this line will take no action on the infection Selecting this column will clean the infectionWarning: Selecting this column will delete the infection (e.g. the infected file) from your hard diskFiles infected by this grayware/spywareThis will display all the files infected by the above grayware/malware.ReasonThis column indicates the reason why cleanup failed.The system denied access to the fileThe current pattern does not support cleanup
    HTTP cookies
    0 Detected
    Cookies are generally used to save user-specific data from Internet transactions with a Web server via a browser. The cookies listed below are "profiling cookies" that are only used to monitor your Internet usage.
    Cleanup options Remove all detected cookies
    Select individual action for each detected cookie
    Keep this cookieRemove this cookieCookiesThe cookies displayed here are classified as potentially malicious.ReasonThis column indicates the reason why cleanup failed.The system denied access to the cookieThe current pattern does not support removal
    Detected vulnerabilities

    Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege and Denial of Service

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This security bulletin resolves newly-discovered, privately-reported vulnerabilities affecting Windows. An attacker who successfully exploited the most severe of these vulnera...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Windows 2000 Service Pack 3
    Microsoft Windows 2000 Service Pack 4
    Microsoft Windows 98
    Microsoft Windows 98 Second Edition
    Microsoft Windows Millennium Edition
    Microsoft Windows Server 2003
    Microsoft Windows Server 2003 for Itanium-based Systems
    Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium)
    Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
    Microsoft Windows XP Service Pack 1
    Microsoft Windows XP Service Pack 2
    Malware exploiting this vulnerability: unknown
    This security bulletin resolves newly-discovered, privately-reported vulnerabilities affecting Windows. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This advisory covers the Graphics Rendering Engine vulnerability and Windows Metafile vulnerability, both of which could allow remote code execution. It also covers the Enhan...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Windows 2000 Service Pack 4
    Microsoft Windows Server 2003
    Microsoft Windows Server 2003 for Itanium-based Systems
    Microsoft Windows Server 2003 Service Pack 1
    Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
    Microsoft Windows Server 2003 x64 Edition
    Microsoft Windows XP Professional x64 Edition
    Microsoft Windows XP Service Pack 1
    Microsoft Windows XP Service Pack 2
    Malware exploiting this vulnerability: unknown
    This advisory covers the Graphics Rendering Engine vulnerability and Windows Metafile vulnerability, both of which could allow remote code execution. It also covers the Enhanced Metafile vulnerability, which allows any program that renders EMF images to be vulnerable to denial of service attacks.
    More information about this vulnerability and its elimination.

    Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution (902412)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This update resolves a newly-discovered, privately-reported vulnerability that can allow a remote malicious user to run arbitrary codes on an affected system. A vulnerability that exi...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Exchange 2000 Server Service Pack 3
    Microsoft Exchange Server 5.0 Service Pack 2
    Microsoft Exchange Server 5.5 Service Pack 4
    Microsoft Office 2000
    Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003
    Microsoft Office 2003 Service Pack 1
    Microsoft Office XP
    Microsoft Office XP Service Pack 3
    Microsoft Outlook 2000
    Microsoft Outlook 2002
    Malware exploiting this vulnerability: unknown
    This update resolves a newly-discovered, privately-reported vulnerability that can allow a remote malicious user to run arbitrary codes on an affected system. A vulnerability that exists in Microsoft Outlook and Microsoft Exchange Server allows remote code execution because of the way they decode the Transport Neutral Encapsulation Format (TNEF) in the MIME attachment.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (905413)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    If a user is logged on with administrative user rights on vulnerable versions of Microsoft Office, a malicious user who successfully exploits this vulnerability may take com...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Excel 2000
    Microsoft Excel 2002
    Microsoft Excel 2003
    Microsoft Excel 2003 Viewer
    Microsoft Excel 2004 for Mac
    Microsoft Excel X for Mac
    Microsoft Office 2000 Multilingual User Interface Packs
    Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office 2004 for Mac
    Microsoft Office X for Mac
    Microsoft Office XP Multilingual User Interface Packs
    Microsoft Office XP Service Pack 3
    Microsoft Outlook 2000
    Microsoft Outlook 2002
    Microsoft Word 2000
    Microsoft Word 2002
    Microsoft Works Suite 2000
    Microsoft Works Suite 2001
    Microsoft Works Suite 2002
    Microsoft Works Suite 2003
    Microsoft Works Suite 2004
    Microsoft Works Suite 2005
    Microsoft Works Suite 2006
    Microsoft PowerPoint 2000
    Microsoft PowerPoint 2002
    Malware exploiting this vulnerability: unknown
    If a user is logged on with administrative user rights on vulnerable versions of Microsoft Office, a malicious user who successfully exploits this vulnerability may take complete control of the client workstation. The malicious user may then install programs; view, change, or delete data; or create new accounts with full user rights. Users with fewer user rights on the system based on their accounts could be less impacted than users with administrative user rights.
    More information about this vulnerability and its elimination.

    Vulnerability in Microsoft Word Could Allow Remote Code Execution (917336)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This vulnerability could allow remote attackers to execute arbitrary code via a specially-crafted document. This vulnerability exists in an object pointer, located in one of the data struct...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office XP Service Pack 3
    Microsoft Word 2000
    Microsoft Word 2002
    Microsoft Word 2003
    Microsoft Word Viewer 2003
    Microsoft Works Suite 2000
    Microsoft Works Suite 2001
    Microsoft Works Suite 2002
    Microsoft Works Suite 2003
    Microsoft Works Suite 2004
    Microsoft Works Suite 2005
    Microsoft Works Suite 2006
    Malware exploiting this vulnerability: unknown
    This vulnerability could allow remote attackers to execute arbitrary code via a specially-crafted document. This vulnerability exists in an object pointer, located in one of the data structures, being read while parsing the document. When a certain error occurs, this pointer can be manipulated to execute arbitrary codes.
    More information about this vulnerability and its elimination.

    Vulnerability in Microsoft PowerPoint Could Allow Remote Code Execution (916768)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This vulnerability allows remote code execution using a malformed record vulnerability. An attacker exploits this vulnerability by creating a PowerPoint file that does not crash PowerPoint program i...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office 2004 for Mac
    Microsoft Office X for Mac
    Microsoft Office XP Service Pack 3
    Microsoft PowerPoint 2000
    Microsoft PowerPoint 2002
    Microsoft PowerPoint 2003
    Microsoft PowerPoint 2004
    Microsoft Powerpoint X for Mac
    Malware exploiting this vulnerability: unknown
    This vulnerability allows remote code execution using a malformed record vulnerability. An attacker exploits this vulnerability by creating a PowerPoint file that does not crash PowerPoint program itself when opened by a user. If a user with administrative user rights opens the said file, an attacker who successfully exploits this vulnerability may take complete control of the system.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This security advisory resolves several vulnerabilities in Microsoft Excel, which, when exploited, could allow attackers to take complete control over an af...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Excel 2000
    Microsoft Excel 2002
    Microsoft Excel 2003
    Microsoft Excel 2003 Viewer
    Microsoft Excel 2004 for Mac
    Microsoft Excel X for Mac
    Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office 2004 for Mac
    Microsoft Office v. X for Mac
    Microsoft Office XP Service Pack 3
    Malware exploiting this vulnerability: unknown
    This security advisory resolves several vulnerabilities in Microsoft Excel, which, when exploited, could allow attackers to take complete control over an affected system.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Microsoft Office Could Allow Remote Code Execution

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This update resolves two newly discovered, privately reported and public vulnerabilities. Each vulnerability is documented. For details, refer to the descri...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Office 2000 Service Pack 3
    Microsoft Office XP Service Pack 3
    Microsoft Office 2003 Service Pack 1 or Service Pack 2
    Microsoft Office 2004 for Mac
    Microsoft Office v. X for Mac
    Microsoft PowerPoint 2000
    Microsoft PowerPoint 2002
    Microsoft Office PowerPoint 2003
    PowerPoint 2004 for Mac
    PowerPoint 2004 v. X for Mac
    Malware exploiting this vulnerability: unknown
    This update resolves two newly discovered, privately reported and public vulnerabilities. Each vulnerability is documented. For details, refer to the description of the CVEIDs enumerated.
    More information about this vulnerability and its elimination.

    Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (910729)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This vulnerability could allow remote attackers to execute arbitrary code on an affected system via a specially crafted Publisher file. This vulnerability exists because Publisher does not perform sufficient data validation when ...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office XP Service Pack 3
    Malware exploiting this vulnerability: unknown
    This vulnerability could allow remote attackers to execute arbitrary code on an affected system via a specially crafted Publisher file. This vulnerability exists because Publisher does not perform sufficient data validation when processing the contents of a .PUB file. When Publisher opens a specially crafted Publisher file and parses a malformed string, it may corrupt system memory, which is actually a stack-based buffer overflow, in such a way that the remote malicious user can gain control of execution and run codes on the affected system.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (924163)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This update addresses several vulnerabilities, which when successfully exploited, could allow remote code execution, in several versions of Microsoft PowerPoint. To exploit the said vulnerabilities, a remote user may design a Web site t...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office 2004 for Mac
    Microsoft Office v. X for Mac
    Microsoft Office XP Service Pack 3
    Microsoft Powerpoint 2000
    Microsoft PowerPoint 2002
    Microsoft PowerPoint 2003
    Microsoft PowerPoint 2004
    Microsoft PowerPoint v. X for Mac
    Malware exploiting this vulnerability: unknown
    This update addresses several vulnerabilities, which when successfully exploited, could allow remote code execution, in several versions of Microsoft PowerPoint. To exploit the said vulnerabilities, a remote user may design a Web site that hosts a PowerPoint (.PPT) file used to exploit this vulnerability. The said vulnerabilities may also be exploited via email, where a remote user sends an email message with a malicious .PPT file attached. Once exploited, the remote malicious user gains control of the system. Users who have fewer rights are less affected than users with administrative rights.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (924164)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    This update addresses several vulnerabilities, which when successfully exploited, could allow remote code execution, in several versions of Microsoft Excel. To exploit the said vulnerabilities, a remote user may design a Web site that h...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Excel 2002
    Microsoft Excel v. X for Mac
    Microsoft Office 2000 Service Pack 3
    Microsoft Office 2003 Service Pack 1
    Microsoft Office 2003 Service Pack 2
    Microsoft Office v. X for Mac
    Microsoft Office XP Service Pack 3
    Microsoft Works Suite 2004
    Microsoft Works Suite 2005
    Microsoft Works Suite 2006
    Microsoft Excel 2003 Viewer
    Microsoft Office 2004 for Mac
    Microsoft Excel 2004 for Mac
    Malware exploiting this vulnerability: unknown
    This update addresses several vulnerabilities, which when successfully exploited, could allow remote code execution, in several versions of Microsoft Excel. To exploit the said vulnerabilities, a remote user may design a Web site that hosts an Excel (.XLS) file used to exploit this vulnerability. The said vulnerabilities may also be exploited via email, where a remote user sends an email message with a malicious .XLS file attached. Once exploited, the remote malicious user gains control of the system. Users who have fewer rights are less affected than users with administrative rights.
    More information about this vulnerability and its elimination.

    Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (924554)

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    A vulnerability exists in the way Word parses a file containing a malformed string; opens a specially-crafted mail merge file, opens a specially-crafted file with a malformed s...
    More information about this vulnerability and its elimination.
    Affected programs and services: Microsoft Office 2000 Service Pack 3
    Microsoft Word 2000
    Microsoft Office XP Service Pack 2
    Microsoft Office XP Service Pack 3
    Microsoft Works Suite 2004
    Microsoft Works Suite 2005
    Microsoft Works Suite 2006
    Microsoft Office v. X for Mac
    Microsoft Word 2003
    Microsoft Word 2003 Viewer
    Microsoft Office 2004 for Mac
    Microsoft Office XP Service Pack 1
    Malware exploiting this vulnerability: unknown
    A vulnerability exists in the way Word parses a file containing a malformed string; opens a specially-crafted mail merge file, opens a specially-crafted file with a malformed stack, and when Word for Mac opens a specially-crafted file that contains a malformed string.
    More information about this vulnerability and its elimination.

    MS07-002

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-003

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-013

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-015

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-017

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-023

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-024

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-025

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-036

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-042

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS07-044

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS08-009

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS08-012

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS08-013

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.

    MS08-025

    Transfering more information about this vulnerability...
    An error occurred while trying to retrieve more information about this vulnerability. There is currently no more information available.
    More information about this vulnerability and its elimination.
    Affected programs and services: unknown
    Malware exploiting this vulnerability: unknown
    More information about this vulnerability and its elimination.
    TITLE_OF_VULNERABILITY

    -------------------------------------------------------------------


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:19:13 AM, on 9/30/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\WINDOWS\system32\CTsvcCDA.EXE
    C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
    C:\Program Files\Symantec AntiVirus\DefWatch.exe
    C:\WINDOWS\eHome\ehRecvr.exe
    C:\WINDOWS\eHome\ehSched.exe
    C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
    C:\WINDOWS\system32\TDispVol.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\WINDOWS\ehome\ehtray.exe
    C:\Program Files\Synaptics\SynTP\Toshiba.exe
    C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\system32\TPSMain.exe
    C:\toshiba\ivp\ism\pinger.exe
    C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\WINDOWS\system32\TPSBattM.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\PROGRA~1\SYMANT~1\VPTray.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\WINDOWS\system32\CTHELPER.EXE
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Symantec AntiVirus\Rtvscan.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
    C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    C:\Program Files\TOSHIBA\Windows Utilities\Fn-esse.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\Program Files\Last.fm\LastFM.exe
    C:\WINDOWS\system32\dllhost.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\eHome\ehmsas.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\drwtsn32.exe
    C:\WINDOWS\system32\drwtsn32.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://softwarereferral.com/jump.php?wmid=6010&mid=MjI6Ojg5&lid=2
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll
    O2 - BHO: ZoneAlarm Spy Blocker BHO - {F0D4B231-DA4B-4daf-81E4-DFEE4931A4AA} - C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL
    O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll
    O3 - Toolbar: ZoneAlarm Spy Blocker - {F0D4B239-DA4B-4daf-81E4-DFEE4931A4AA} - C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL
    O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
    O4 - HKLM\..\Run: [TDispVol] TDispVol.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
    O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
    O4 - HKLM\..\Run: [THotkey] C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
    O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
    O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe"
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
    O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKLM\..\Run: [Acrobat Assistant 8.0] "C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe"
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
    O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [Creative Detector] C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe /R
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Startup: Fn-esse.lnk = ?
    O4 - Startup: Last.fm.lnk = C:\Program Files\Last.fm\LastFM.exe
    O8 - Extra context menu item: Append to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
    O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
    O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
    O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
    O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
    O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
    O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
    O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart
    O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
    O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
    O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Desktop Manager 5.7.806.10245 (GoogleDesktopManager-061008-081103) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
    O23 - Service: OpenCASE Media Agent - ExtendMedia Inc. - C:\Program Files\OpenCASE\OpenCASE Media Agent\MediaAgent.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
    O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
    O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

    --
    End of file - 13067 bytes
     
    Last edited: Sep 30, 2008
  2. onya

    onya Guest

    Here's a little gem that aint free, but so far it's worked a treat.
    Trojan remover available from AD...

    http://www.afterdawn.com/software/desktop_software/desktop_security/

    This cleaned my system like a treat. The damage caused by this net nasty I had, sounds vaguely similar to what you're experiencing. Once run (Trojan remover) you may have to reinsert your original OS disc, just in case a dll or two have been renamed.

    TR is a very small app and takes next to no time to install and run.

    Cheers.
     
  3. bilcal7

    bilcal7 Member

    Joined:
    Sep 30, 2008
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    11
    Thanks a lot!
     
  4. onya

    onya Guest

    No worries. Howd you go? get it all sorted out?

    Cheers.
     
  5. bilcal7

    bilcal7 Member

    Joined:
    Sep 30, 2008
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    11
    I didn't actually end up utilizing your strategy. On some other forum I found someone with the same problem and followed their solution that worked for them. Turned out all I had to do was reinstall Xvid. I'll come back here if I have further problems, though.

    Thanks!
     

Share This Page