I've also added a fresh Hijackthis log, just as an extra that might help. Oh and after Avira AntiVir finished scanning and after rebooting, Windows ran a CHKDSK. Telling you that just so you know.
Avira AntiVir Personal
Report file date: ×™×•× ×¨×שון 07 ×™×•× ×™ 2009 23:36
Scanning for 1457764 virus strains and unwanted programs.
Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : TAP-7409E23BDD
Version information:
BUILD.DAT : 9.0.0.394 17962 Bytes 17/04/2009 11:20:00
AVSCAN.EXE : 9.0.3.5 466689 Bytes 17/04/2009 06:57:30
AVSCAN.DLL : 9.0.3.0 40705 Bytes 27/02/2009 08:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 20/02/2009 09:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 27/02/2009 08:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 10:30:36
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 11/02/2009 18:33:26
ANTIVIR2.VDF : 7.1.4.38 2692096 Bytes 29/05/2009 20:35:12
ANTIVIR3.VDF : 7.1.4.66 237568 Bytes 07/06/2009 20:35:17
Engineversion : 8.2.0.180
AEVDF.DLL : 8.1.1.1 106868 Bytes 07/06/2009 20:35:55
AESCRIPT.DLL : 8.1.2.0 389497 Bytes 07/06/2009 20:35:54
AESCN.DLL : 8.1.2.3 127347 Bytes 07/06/2009 20:35:51
AERDL.DLL : 8.1.1.3 438645 Bytes 29/10/2008 16:24:41
AEPACK.DLL : 8.1.3.18 401783 Bytes 07/06/2009 20:35:49
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 26/02/2009 18:01:56
AEHEUR.DLL : 8.1.0.129 1761655 Bytes 07/06/2009 20:35:44
AEHELP.DLL : 8.1.2.2 119158 Bytes 26/02/2009 18:01:56
AEGEN.DLL : 8.1.1.44 348532 Bytes 07/06/2009 20:35:24
AEEMU.DLL : 8.1.0.9 393588 Bytes 09/10/2008 12:32:40
AECORE.DLL : 8.1.6.12 180599 Bytes 07/06/2009 20:35:19
AEBB.DLL : 8.1.0.3 53618 Bytes 09/10/2008 12:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 06:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 05/12/2008 08:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 20/01/2009 12:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 05/12/2008 08:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 24/03/2009 13:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 30/01/2009 08:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 28/01/2009 13:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 02/02/2009 06:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 05/12/2008 08:32:10
RCIMAGE.DLL : 9.0.0.21 2438401 Bytes 09/02/2009 09:45:45
RCTEXT.DLL : 9.0.37.0 86785 Bytes 17/04/2009 08:19:48
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Start of the scan: ×™×•× ×¨×שון 07 ×™×•× ×™ 2009 23:36
Starting search for hidden objects.
'78924' objects were checked, '0' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'GoogleUpdate.exe' - '1' Module(s) have been scanned
Scan process 'daemon.exe' - '1' Module(s) have been scanned
Scan process 'NMBgMonitor.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
28 processes with 28 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan executable files (registry).
The registry was scanned ( '56' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Microsoft\Windows Defender\Quarantine\{00001FD0-0001-0000-D7EE-A8F10EB4A99D}\DATA.CAB
- Archive type: CAB (Microsoft)
--> RESOURCE1
[1] Archive type: HIDDEN
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
--> RESOURCE2
[1] Archive type: HIDDEN
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
--> RESOURCE3
[1] Archive type: HIDDEN
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
--> RESOURCE4
[1] Archive type: HIDDEN
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
--> RESOURCE5
[1] Archive type: HIDDEN
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
--> RESOURCE6
[1] Archive type: HIDDEN
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
C:\Documents and Settings\עדן\Application Data\Sun\Java\Deployment\cache\6.0\54\7c9afc76-52cca17d
--> OP.class
[DETECTION] Contains recognition pattern of the EXP/ByteVerify.I exploit
C:\Documents and Settings\עדן\My Documents\rootcracker alpha 1.3.rar
--> rootcracker alpha 1.3\rootcracker.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\Documents and Settings\עדן\My Documents\rootcracker alpha 1.3\rootcracker.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\Documents and Settings\עדן\My Documents\×”×§×‘×¦×™× ×©×œ×™ שהתקבלו\1014_rootcracker alpha 1.3.rar
--> rootcracker alpha 1.3\rootcracker.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\Documents and Settings\עדן\שולחן העבודה\new.logic.1.1.beta.1a\emule.exe
[DETECTION] Is the TR/Dldr.Agent.vma Trojan
C:\Program Files\EA GAMES\Need for Speed Underground 2\rld-nu2k.exe
[DETECTION] Is the TR/Packed.22775 Trojan
C:\Program Files\Knight Empire\dual.dll
[DETECTION] Is the TR/Agent.buyg Trojan
C:\Program Files\Knight Empire\DualClient.exe
[DETECTION] Is the TR/Spy.VB.bkc Trojan
C:\Program Files\Knight Empire\KnightOnLine.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
C:\Program Files\Knight Online\Launcher.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
C:\Program Files\Knight-Empire.net\Knight-Empire\KnightOnLine.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
C:\Program Files\KnightOnline\Launcher.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
C:\Program Files\Teamspeak2_RC2\TeamSpeak.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Darkmoon.GM.1 back-door program
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0657637.exe
[DETECTION] Is the TR/Packed.22775 Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0672591.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0679598.exe
[DETECTION] Is the TR/Agent.ggn Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0683520.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0684127.dll
[DETECTION] Is the TR/Agent.buyg Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0684129.exe
[DETECTION] Is the TR/Spy.VB.bkc Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0684133.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP318\A0708079.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP325\A0731393.exe
[DETECTION] Is the TR/Agent.ggn Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP329\A0733014.exe
[DETECTION] Is the TR/Agent.ggn Trojan
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP329\A0733040.exe
[DETECTION] Contains recognition pattern of the DIAL/Dialer.Gen dialer
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP329\A0733214.ocx
[DETECTION] Contains recognition pattern of the ADSPY/I2ISolution.A adware or spyware
C:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
C:\×ª×•×›× ×•×ª\OfficeXP (D)\OFFICE1.CAB
- Archive type: CAB (Microsoft)
--> Pkmormsd.5F4F.76FACAA8_4C38_49B4_B59C_6698F3D0BB4F
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\×ª×•×›× ×•×ª\OfficeXP (D)\FILES\OSP\1037\IE5\HB\VMX86_01.CAB
- Archive type: CAB (Microsoft)
--> javax86.cab
[1] Archive type: CAB (Microsoft)
--> dx3j.dll
[WARNING] No further files can be extracted from this archive. The archive will be closed
Beginning disinfection:
C:\Documents and Settings\All Users.WINDOWS\Application Data\Microsoft\Windows Defender\Quarantine\{00001FD0-0001-0000-D7EE-A8F10EB4A99D}\DATA.CAB
[NOTE] The file was moved to '4a803992.qua'!
C:\Documents and Settings\עדן\Application Data\Sun\Java\Deployment\cache\6.0\54\7c9afc76-52cca17d
[NOTE] The file was moved to '4a6539b4.qua'!
C:\Documents and Settings\עדן\My Documents\rootcracker alpha 1.3.rar
[NOTE] The file was moved to '4a9b39c0.qua'!
C:\Documents and Settings\עדן\My Documents\rootcracker alpha 1.3\rootcracker.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '4b055c39.qua'!
C:\Documents and Settings\עדן\My Documents\×”×§×‘×¦×™× ×©×œ×™ שהתקבלו\1014_rootcracker alpha 1.3.rar
[NOTE] The file was moved to '4a5d3981.qua'!
C:\Documents and Settings\עדן\שולחן העבודה\new.logic.1.1.beta.1a\emule.exe
[DETECTION] Is the TR/Dldr.Agent.vma Trojan
[NOTE] The file was moved to '4aa139bf.qua'!
C:\Program Files\EA GAMES\Need for Speed Underground 2\rld-nu2k.exe
[DETECTION] Is the TR/Packed.22775 Trojan
[NOTE] The file was moved to '4a9039be.qua'!
C:\Program Files\Knight Empire\dual.dll
[DETECTION] Is the TR/Agent.buyg Trojan
[NOTE] The file was moved to '4a8d39c7.qua'!
C:\Program Files\Knight Empire\DualClient.exe
[DETECTION] Is the TR/Spy.VB.bkc Trojan
[NOTE] The file was moved to '494421d0.qua'!
C:\Program Files\Knight Empire\KnightOnLine.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
[NOTE] The file was moved to '4a9539c1.qua'!
C:\Program Files\Knight Online\Launcher.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
[NOTE] The file was moved to '4aa139b4.qua'!
C:\Program Files\Knight-Empire.net\Knight-Empire\KnightOnLine.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
[NOTE] The file was moved to '4b0496e2.qua'!
C:\Program Files\KnightOnline\Launcher.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
[NOTE] The file was moved to '4b0044e5.qua'!
C:\Program Files\Teamspeak2_RC2\TeamSpeak.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Darkmoon.GM.1 back-door program
[NOTE] The file was moved to '4a8d39b8.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0657637.exe
[DETECTION] Is the TR/Packed.22775 Trojan
[NOTE] The file was moved to '4a623983.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0672591.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
[NOTE] The file was moved to '495cb6ac.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0679598.exe
[DETECTION] Is the TR/Agent.ggn Trojan
[NOTE] The file was moved to '4a623984.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0683520.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
[NOTE] The file was moved to '49239f05.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0684127.dll
[DETECTION] Is the TR/Agent.buyg Trojan
[NOTE] The file was moved to '4a623986.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0684129.exe
[DETECTION] Is the TR/Spy.VB.bkc Trojan
[NOTE] The file was moved to '49218f97.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP316\A0684133.exe
[DETECTION] Is the TR/Spy.Agent.amfd Trojan
[NOTE] The file was moved to '4926845f.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP318\A0708079.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Bifrost.671 back-door program
[NOTE] The file was moved to '4a633986.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP325\A0731393.exe
[DETECTION] Is the TR/Agent.ggn Trojan
[NOTE] The file was moved to '4a633987.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP329\A0733014.exe
[DETECTION] Is the TR/Agent.ggn Trojan
[NOTE] The file was moved to '495caf78.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP329\A0733040.exe
[DETECTION] Contains recognition pattern of the DIAL/Dialer.Gen dialer
[NOTE] The file was moved to '492f5090.qua'!
C:\System Volume Information\_restore{0D1368F3-4705-4684-A322-DC445637B4F1}\RP329\A0733214.ocx
[DETECTION] Contains recognition pattern of the ADSPY/I2ISolution.A adware or spyware
[NOTE] The file was moved to '49296000.qua'!
End of the scan: ×™×•× ×©× ×™ 08 ×™×•× ×™ 2009 01:04
Used time: 1:26:33 Hour(s)
The scan has been done completely.
13882 Scanned directories
456154 Files were scanned
31 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
26 Files were moved to quarantine
0 Files were renamed
3 Files cannot be scanned
456120 Files not concerned
2139 Archives were scanned
6 Warnings
28 Notes
78924 Objects were scanned with rootkit scan
0 Hidden objects were found
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 01:29:16, on 08/06/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\Documents and Settings\עדן\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\עדן\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\עדן\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
c:\program files\avira\antivir desktop\avcenter.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.google.co.il/R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
http://go.microsoft.com/fwlink/?LinkId=54896R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~2\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: עוזר ×”×›× ×™×¡×” של Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools\daemon.exe"
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\עדן\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [AdobeUpdater] C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &×™×¦× ×œ- Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Program Files\ICQLite\ICQLite.exe (file missing)
O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Program Files\ICQLite\ICQLite.exe (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~2\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~2\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Program Files\ICQ6\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Program Files\ICQ6\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\prxernsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\prxerdrv.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\prxerdrv.dll
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Plugin Control) -
http://appldnld.apple.com.edgesuite.net/co...ex/qtplugin.cabO16 - DPF: {02ECD07A-22D0-4AF0-BA0A-3F6B06086D08} (GamesCampus Control) -
http://xiah.gamescampus.com/luncher/GamesCampus.cabO16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) -
http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cabO16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) -
http://www.update.microsoft.com/microsoftu...b?1202306177953O16 - DPF: {784797A8-342D-4072-9486-03C8D0F2F0A1} (Battlefield Heroes Updater) -
https://play.battlefield-heroes.com/static/...er_4.0.15.0.cabO16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) -
http://javadl-esd.sun.com/update/1.6.0/jin...ows-i586-jc.cabO16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) -
http://www.crucial.com/controls/cpcScanner.cabO16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) -
http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cabO16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) -
http://www.adobe.com/products/acrobat/nos/gp.cabO16 - DPF: {E5F5D008-DD2C-4D32-977D-1A0ADF03058B} (JuniperSetupSP1 Control) -
https://ssl.sonol.co.il/dana-cached/setup/J...perSetupSP1.cabO16 - DPF: {F59AB0C4-3443-4551-A78F-C101F9DE0215} -
http://irc.nana.co.il/Cabs/launcher39.cabO16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) -
http://messenger.zone.msn.com/binary/MineS...er.cab56986.cabO17 - HKLM\System\CCS\Services\Tcpip\..\{138FBCB5-DF29-4828-B640-71D6034CC076}: NameServer = 192.115.106.31 192.115.106.31
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
--
End of file - 8568 bytes