Avatar billede 1wgoldbergw1 Nybegynder
13. maj 2009 - 17:07 Der er 22 kommentarer

HAR SERIØST BRUG FOR HJÆLP!!

jeg har seriøst brug for hjælp med min computer
når jeg starter min computer kommer der alverdens ting op som feks. 3 errorcodes som er MFC71.dll ,Filnavn Document Viewer filtype instalation package (*.msi) Error code 2761 og Windows Installer (som når den er noget til enden vil den have en cd)

kan nogen hjælpe mig???!!
Avatar billede Slettet bruger
13. maj 2009 - 17:42 #1
Sysstemgendannelse tilbage til da computeren virkede
13. maj 2009 - 18:18 #2
For 142'ende gang -> skal vi gætte:
Win98, W2000, XP, Vista, Win7, ... ?

(Ikke specielt go' overskrift ???)
Avatar billede 1wgoldbergw1 Nybegynder
13. maj 2009 - 19:33 #3
jeg har Windows XP
14. maj 2009 - 06:31 #4
... for en go' ordens skyld; stik os/mig en HiJackThis ->
http://www.spywareinfo.dk/index.htm#/manualer/hijackthis.htm

Bemærk at HiJackThis.exe programmet skal gemmes i en dertil oprettet mappe og IKKE køres direkte fra nettet...

PS: Brug denne version af HJT -> http://www.trendsecure.com/portal/en-US/_download/HiJackThis.exe

Ikke nødvendigvis pga virus ell. lign. men så ka' jeg se hvad der er i din opstart mm.
Avatar billede 1wgoldbergw1 Nybegynder
14. maj 2009 - 15:25 #5
her er den





Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:23:06, on 14-05-2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
C:\WINDOWS\system32\java.exe
C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\WINDOWS\system32\UAService7.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\QTTask.exe
C:\WINDOWS\vsnpstd3.exe
C:\Program Files\SweetIM\Messenger\SweetIM.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\system32\wuauclt.exe
D:\Documents and Settings\TEMP\Desktop\Ny mappe\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://format.packardbell.com/cgi-bin/redirect/?country=DK&range=AD&phase=6&key=SEARCH
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = file://C:\APPS\IE\offline\dan.htm
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
R3 - URLSearchHook: SweetIM ToolbarURLSearchHook Class - {EEE6C35D-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgHelper.dll
R3 - URLSearchHook: Gdclan Toolbar - {fa57e31a-a29d-4491-9689-77ecccfa5874} - C:\Program Files\Gdclan\tbGdcl.dll
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - (no file)
O2 - BHO: AskBar BHO - {201f27d4-3704-41d6-89c1-aa35e39143ed} - C:\Program Files\AskBarDis\bar\bin\askBar.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.0.0.134\IPSBHO.DLL
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.1.1309.3572\swg.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: SWEETIE - {EEE6C35C-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O2 - BHO: Gdclan Toolbar - {fa57e31a-a29d-4491-9689-77ecccfa5874} - C:\Program Files\Gdclan\tbGdcl.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: SweetIM Toolbar for Internet Explorer - {EEE6C35B-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O3 - Toolbar: Ask Toolbar - {3041d03e-fd4b-44e0-b742-2d9b88305f98} - C:\Program Files\AskBarDis\bar\bin\askBar.dll
O3 - Toolbar: Gdclan Toolbar - {fa57e31a-a29d-4491-9689-77ecccfa5874} - C:\Program Files\Gdclan\tbGdcl.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ATICCC] "c:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [Vade Retro Outlook Express] "C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe
O4 - HKLM\..\Run: [SweetIM] C:\Program Files\SweetIM\Messenger\SweetIM.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] ~"C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe"
O4 - HKCU\..\Run: [IpSharkk] "C:\Program Files\IpSharkk\IpSharkk.exe" /auto
O4 - HKCU\..\RunOnce: [Shockwave Updater] C:\WINDOWS\system32\Adobe\SHOCKW~1\SWHELP~2.EXE -Update -1100465 -"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; byond_4.0; FunWebProducts; SIMBAR={B3A172C2-468C-4B67-91D8-A666B122ABD7}; GTB6; .NET CLR 1.0.3705; .NET CLR 1.1.4322; .NET CLR 2.0.50727; Media Center PC 4.0; HbTools 4.8.4; .NET CLR 3.0.4506.2152)" -"http://www.mofunzone.com/popups/4_wheel_fury_2.shtml"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKAL TJENESTE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETVÆRKSTJENESTE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Hurtig start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZZzer000YYDK
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - D:\Documents and Settings\TEMP\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\dan.htm
O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei-4/ZwinkyInitialSetup1.0.1.1.cab
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.7.109.cab
O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.4.1.cab
O16 - DPF: {4C68DACE-E6BC-4650-9C7E-D036720CA729} (Nps Control) - http://kr.gameguard.nprotect.com/inca/onscan//tyscan/nps.cab
O16 - DPF: {63F5866B-A7C5-40B4-9A89-0CCA99726C8D} (LogMeIn Rescue Applet Downloader) - https://secure.logmeinrescue.com/Customer/x86/RescueDownloader.cab
O16 - DPF: {69EF49E5-FE46-4B92-B5FA-2193AB7A6B8A} (GameLauncher Control) - http://www.acclaim.com/cabs/acclaim_v8.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {99CAAA27-FA0C-4FA4-B88A-4AB1CC7A17FE} (MGLaunch_v1004 Class) - http://ghost.netgame.com/launch/object/mglaunch_USAv1004.cab
O16 - DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} (NeffyLauncherCtl Class) - http://dist.globalgamecdn.com/dist/neffy/NeffyLauncher.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab
O16 - DPF: {BD08A9D5-0E5C-4F42-99A3-C0CB5E860557} (CSolidBrowserObj Object) - http://cdn1.acclaimdownloads.com/solidstateion.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab57213.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C49134CC-B5EF-458C-A442-E8DFE7B4645F} (YYGInstantPlay Control) - http://www.yoyogames.com/downloads/activex/YoYo.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
O16 - DPF: {DB7BF79A-FC51-4B5A-92BC-A65731174380} (InstantAction Game Launcher) - http://www.instantaction.com/download/iaplayer.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\WINDOWS\system32\Skype4COM.dll
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatisk LiveUpdate-planlægning - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
O23 - Service: Bonjour-tjeneste (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Update Service (gupdate1c992c9f5cf9a78) (gupdate1c992c9f5cf9a78) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: Shoddy Battle Server (shoddybattle) - Unknown owner - C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
O23 - Service: Start BT in service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
O23 - Service: SecuROM User Access Service (V7) (UserAccess7) - Sony DADC Austria AG. - C:\WINDOWS\system32\UAService7.exe

--
End of file - 16012 bytes
14. maj 2009 - 19:03 #6
Under alle omstændigheder ->

Afinstaller

* BitTorrent DNA
Grrrrr... Det er jo lige meget hvor meget folk har på af sikkerhed/opdateringer. Hvis de først begynder at 'lege' med P2P programmer - eller retterer reslutater derfra - så er det lige vidt !!!
http://www.spywarefri.dk/forum/topic.asp?TOPIC_ID=40284
http://www.spywarefri.dk/forum/topic.asp?TOPIC_ID=47308

* SweetIM
* Yahoo! Toolbar
* Gdclan Toolbar
* Ask Toolbar
* Bonjour
* Google Update Service

via
[Start][Indstilninger][Kontrolpanel][Tilføj/fjern programmer]

Genstart for at fuldføre afinstalationen...

---------------------------------------

Hent og instalér CCleaner http://www.ccleaner.com/ + http://www.spywarefri.dk/manualer/ccleaner-manual.htm
Under installationen får du tilbudt [Yahoo Toolbar]. Du kan sige ja eller *NEJ* til den.
Lad programmet foretage en oprydning...

--------

Hent Malwarebytes Anti-Malware herfra:
http://www.besttechie.net/tools/mbam-setup.exe
Eller herfra ->
http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html

Installer programmet - når det er gjort skal du lade programmet opdatere sig. Herefter åbner et vindue, hvor du skal flytte prikken til "Kør et fuldstændigt systemscan" - klik på Skan Knappen - lad programmet arbejde. Når det er færdig (det tager lidt tid afhængig af hvor meget du har på computeren).
Derefter - Tryk på "Vis resultater" knappen efter scanningen - og herefter tryk på "Fjern det valgte" - nu åbnes log'en og du skal gemme den et sted, hvor du kan finde den igen.
Kopier indholdet herind sammen med en frisk log fra HiJackThis...
Avatar billede 1wgoldbergw1 Nybegynder
15. maj 2009 - 16:39 #7
Jeg kan desværre ikke finde den der Malware bytes's log fil

men der blev fundet 128 fejl og de fleste af dem var fra et program kaldet "errorfix" og resten var registrykeys



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 16:27:48, on 15-05-2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\java.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\WINDOWS\system32\UAService7.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\QTTask.exe
C:\WINDOWS\vsnpstd3.exe
C:\Program Files\SweetIM\Messenger\SweetIM.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\msiexec.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\system32\wuauclt.exe
D:\Documents and Settings\TEMP\Desktop\Ny mappe\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://format.packardbell.com/cgi-bin/redirect/?country=DK&range=AD&phase=6&key=SEARCH
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = file://C:\APPS\IE\offline\dan.htm
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - (no file)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.0.0.134\IPSBHO.DLL
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: SWEETIE - {EEE6C35C-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll (file missing)
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ATICCC] "c:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [Vade Retro Outlook Express] "C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe
O4 - HKLM\..\Run: [SweetIM] C:\Program Files\SweetIM\Messenger\SweetIM.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] ~"C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe"
O4 - HKCU\..\Run: [IpSharkk] "C:\Program Files\IpSharkk\IpSharkk.exe" /auto
O4 - HKCU\..\RunOnce: [Shockwave Updater] C:\WINDOWS\system32\Adobe\SHOCKW~1\SWHELP~2.EXE -Update -1100465 -"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; byond_4.0; FunWebProducts; SIMBAR={B3A172C2-468C-4B67-91D8-A666B122ABD7}; GTB6; .NET CLR 1.0.3705; .NET CLR 1.1.4322; .NET CLR 2.0.50727; Media Center PC 4.0; HbTools 4.8.4; .NET CLR 3.0.4506.2152)" -"http://www.mofunzone.com/popups/4_wheel_fury_2.shtml"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKAL TJENESTE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETVÆRKSTJENESTE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Hurtig start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - D:\Documents and Settings\TEMP\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\dan.htm
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.7.109.cab
O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.4.1.cab
O16 - DPF: {4C68DACE-E6BC-4650-9C7E-D036720CA729} (Nps Control) - http://kr.gameguard.nprotect.com/inca/onscan//tyscan/nps.cab
O16 - DPF: {63F5866B-A7C5-40B4-9A89-0CCA99726C8D} (LogMeIn Rescue Applet Downloader) - https://secure.logmeinrescue.com/Customer/x86/RescueDownloader.cab
O16 - DPF: {69EF49E5-FE46-4B92-B5FA-2193AB7A6B8A} (GameLauncher Control) - http://www.acclaim.com/cabs/acclaim_v8.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {99CAAA27-FA0C-4FA4-B88A-4AB1CC7A17FE} (MGLaunch_v1004 Class) - http://ghost.netgame.com/launch/object/mglaunch_USAv1004.cab
O16 - DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} (NeffyLauncherCtl Class) - http://dist.globalgamecdn.com/dist/neffy/NeffyLauncher.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab
O16 - DPF: {BD08A9D5-0E5C-4F42-99A3-C0CB5E860557} (CSolidBrowserObj Object) - http://cdn1.acclaimdownloads.com/solidstateion.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab57213.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C49134CC-B5EF-458C-A442-E8DFE7B4645F} (YYGInstantPlay Control) - http://www.yoyogames.com/downloads/activex/YoYo.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
O16 - DPF: {DB7BF79A-FC51-4B5A-92BC-A65731174380} (InstantAction Game Launcher) - http://www.instantaction.com/download/iaplayer.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\WINDOWS\system32\Skype4COM.dll
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatisk LiveUpdate-planlægning - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
O23 - Service: Google Update Service (gupdate1c992c9f5cf9a78) (gupdate1c992c9f5cf9a78) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: Shoddy Battle Server (shoddybattle) - Unknown owner - C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
O23 - Service: Start BT in service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
O23 - Service: SecuROM User Access Service (V7) (UserAccess7) - Sony DADC Austria AG. - C:\WINDOWS\system32\UAService7.exe

--
End of file - 13784 bytes
15. maj 2009 - 16:43 #8
Start Malwarebytes programmet - gå til Fanebladet [Logs] - og læs hvad der står ...
15. maj 2009 - 16:47 #9
O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe" ?

Citat:

Afinstaller
* BitTorrent DNA
Avatar billede 1wgoldbergw1 Nybegynder
15. maj 2009 - 17:58 #10
yes det må du undskylde men nu har jeg det hele



Malwarebytes' Anti-Malware 1.36
Database version: 2134
Windows 5.1.2600 Service Pack 3

15-05-2009 16:19:59
mbam-log-2009-05-15 (16-19-59).txt

Skan type: Fuldstændig skanning (C:\|D:\|)
Objekter skannet: 233863
Tid tilbagelagt: 1 hour(s), 24 minute(s), 31 second(s)

Inficerede Hukommelses Processer: 0
Inficerede Hukommelses Moduler: 0
Inficerede Registeringsdatabase Nøgler: 34
Inficerede Registeringsdatabase Værdier: 1
Inficerede Registeringsdatabase Filer: 2
Inficerede Mapper: 24
Inficerede Filer: 226

Inficerede Hukommelses Processer:
(Ingen mistænkelige filer fundet)

Inficerede Hukommelses Moduler:
(Ingen mistænkelige filer fundet)

Inficerede Registeringsdatabase Nøgler:
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWay) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Inficerede Registeringsdatabase Værdier:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\ (Adware.Hotbar) -> Quarantined and deleted successfully.

Inficerede Registeringsdatabase Filer:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Inficerede Mapper:
D:\Documents and Settings\jolanta\Application Data\ShoppingReport (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\db (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\dwld (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\report (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\res1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared (Adware.MyWebSearch) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\Application Data\FunWebProducts (Adware.MyWay) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\Application Data\FunWebProducts\Data (Adware.MyWay) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\Application Data\FunWebProducts\Data\jimmy (Adware.MyWay) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Logs (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110 (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Results (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Inficerede Filer:
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\Config.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\db\Aliases.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\db\Sites.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\dwld\WhiteList.xip (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\report\aggr_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\report\send_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ShoppingReport\cs\res1\WhiteList.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History\search3 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\setting2.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\settings.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr\History\allowed (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr\History\notallow (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\007DF481.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\Application Data\FunWebProducts\Data\jimmy\avatar.dat (Adware.MyWay) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\Application Data\FunWebProducts\Data\jimmy\register.dat (Adware.MyWay) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\Application Data\FunWebProducts\Data\jimmy\zbucks.dat (Adware.MyWay) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\spy_ignore.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Logs\2009-05-11 15-11-240.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\filelist.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-1.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-10.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-100.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-101.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-102.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-103.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-104.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-105.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-106.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-107.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-108.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-109.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-11.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-110.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-111.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-112.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-113.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-114.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-115.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-116.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-117.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-118.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-119.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-12.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-120.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-121.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-122.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-123.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-124.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-125.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-126.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-127.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-128.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-129.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-13.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-130.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-131.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-132.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-133.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-134.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-135.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-136.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-137.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-138.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-139.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-14.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-140.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-141.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-142.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-143.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-144.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-145.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-146.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-147.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-148.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-149.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-15.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-150.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-151.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-152.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-153.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-154.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-155.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-156.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-157.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-158.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-159.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-16.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-160.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-161.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-162.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-163.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-164.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-165.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-166.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-167.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-168.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-169.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-17.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-170.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-171.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-172.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-173.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-174.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-175.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-176.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-177.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-178.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-179.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-18.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-180.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-181.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-182.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-183.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-184.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-185.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-186.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-187.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-188.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-189.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-19.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-190.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-191.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-192.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-193.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-194.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-195.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-196.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-197.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-198.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-199.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-2.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-20.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-21.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-22.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-23.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-24.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-25.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-26.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-27.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-28.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-29.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-3.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-30.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-31.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-32.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-33.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-34.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-35.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-36.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-37.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-38.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-39.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-4.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-40.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-41.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-42.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-43.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-44.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-45.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-46.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-47.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-48.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-49.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-5.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-50.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-51.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-52.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-53.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-54.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-55.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-56.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-57.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-58.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-59.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-6.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-60.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-61.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-62.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-63.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-64.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-65.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-66.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-67.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-68.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-69.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-7.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-70.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-71.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-72.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-73.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-74.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-75.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-76.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-77.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-78.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-79.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-8.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-80.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-81.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-82.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-83.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-84.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-85.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-86.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-87.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-88.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-89.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-9.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-90.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-91.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-92.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-93.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-94.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-95.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-96.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-97.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-98.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\QuarantineW\2009-05-11 15-16-110\regb-99.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Results\Evidence.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Results\Junk.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Results\Registry.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\jolanta\Application Data\ErrorFix\Results\Update.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
D:\Documents and Settings\TEMP\list.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\ErrorFix Scan.job (Rogue.ErrorFix) -> Quarantined and deleted successfully.


og nu HijackThis...

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:58:09, on 15-05-2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\java.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\WINDOWS\system32\UAService7.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\QTTask.exe
C:\WINDOWS\vsnpstd3.exe
C:\Program Files\SweetIM\Messenger\SweetIM.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Program Files\Internet Explorer\iexplore.exe
D:\Documents and Settings\TEMP\Desktop\Ny mappe\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = file://C:\APPS\IE\offline\dan.htm
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - (no file)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.0.0.134\IPSBHO.DLL
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: SWEETIE - {EEE6C35C-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll (file missing)
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ATICCC] "c:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [Vade Retro Outlook Express] "C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe
O4 - HKLM\..\Run: [SweetIM] C:\Program Files\SweetIM\Messenger\SweetIM.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] ~"C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\RunOnce: [Shockwave Updater] C:\WINDOWS\system32\Adobe\SHOCKW~1\SWHELP~2.EXE -Update -1100465 -"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; byond_4.0; FunWebProducts; SIMBAR={B3A172C2-468C-4B67-91D8-A666B122ABD7}; GTB6; .NET CLR 1.0.3705; .NET CLR 1.1.4322; .NET CLR 2.0.50727; Media Center PC 4.0; HbTools 4.8.4; .NET CLR 3.0.4506.2152)" -"http://www.mofunzone.com/popups/4_wheel_fury_2.shtml"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKAL TJENESTE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETVÆRKSTJENESTE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Hurtig start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - D:\Documents and Settings\TEMP\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\dan.htm
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.7.109.cab
O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.4.1.cab
O16 - DPF: {4C68DACE-E6BC-4650-9C7E-D036720CA729} (Nps Control) - http://kr.gameguard.nprotect.com/inca/onscan//tyscan/nps.cab
O16 - DPF: {63F5866B-A7C5-40B4-9A89-0CCA99726C8D} (LogMeIn Rescue Applet Downloader) - https://secure.logmeinrescue.com/Customer/x86/RescueDownloader.cab
O16 - DPF: {69EF49E5-FE46-4B92-B5FA-2193AB7A6B8A} (GameLauncher Control) - http://www.acclaim.com/cabs/acclaim_v8.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {99CAAA27-FA0C-4FA4-B88A-4AB1CC7A17FE} (MGLaunch_v1004 Class) - http://ghost.netgame.com/launch/object/mglaunch_USAv1004.cab
O16 - DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} (NeffyLauncherCtl Class) - http://dist.globalgamecdn.com/dist/neffy/NeffyLauncher.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab
O16 - DPF: {BD08A9D5-0E5C-4F42-99A3-C0CB5E860557} (CSolidBrowserObj Object) - http://cdn1.acclaimdownloads.com/solidstateion.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab57213.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C49134CC-B5EF-458C-A442-E8DFE7B4645F} (YYGInstantPlay Control) - http://www.yoyogames.com/downloads/activex/YoYo.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
O16 - DPF: {DB7BF79A-FC51-4B5A-92BC-A65731174380} (InstantAction Game Launcher) - http://www.instantaction.com/download/iaplayer.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\WINDOWS\system32\Skype4COM.dll
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatisk LiveUpdate-planlægning - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
O23 - Service: Google Update Service (gupdate1c992c9f5cf9a78) (gupdate1c992c9f5cf9a78) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: Shoddy Battle Server (shoddybattle) - Unknown owner - C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
O23 - Service: Start BT in service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
O23 - Service: SecuROM User Access Service (V7) (UserAccess7) - Sony DADC Austria AG. - C:\WINDOWS\system32\UAService7.exe

--
End of file - 13642 bytes
16. maj 2009 - 13:50 #11
[Malwarebytes] fik jo nappet en hel del!!!

Derefter:

[ Shoddy Battle Server ] - ved du selv hvad det er ?

Virker din Symantec/Norton360 ? Også mht opdateringer ?

----

Ta' en oprydning med nævnte CCleaner...

----

Check hos WindowsUpdate om opdateringer ? Du mangler bla. IE8 + efterfølgende opdateringer...

----

Der er lidt mere oprydning; det må vi ta' bagefter mere eller mindre manuelt ...

----
Avatar billede 1wgoldbergw1 Nybegynder
16. maj 2009 - 15:14 #12
Jeg har gjort alt det som du sagde jeg skulle

så nu venter jeg på mine næste instrukser xD
og mange tak for hjælpen som du har givet indtil videre
16. maj 2009 - 17:06 #13
Hvordan kører PC'en så nu ? Specielt mht den oprindelige fejl ...

Stik mig lige en frisk log fra HiJackThis for evt. efteroprydning...
Avatar billede 1wgoldbergw1 Nybegynder
16. maj 2009 - 21:22 #14
den kører ikke så godt det har ikke hjulpet spor med undtagelse af

Document Viewer filtype instalation package (*.msi) Error code 2761

men tilgændgel kører computeren en smule hurtigere
Avatar billede 1wgoldbergw1 Nybegynder
17. maj 2009 - 10:37 #15
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:37:14, on 17-05-2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\QTTask.exe
C:\WINDOWS\vsnpstd3.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\SweetIM\Messenger\SweetIM.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
C:\WINDOWS\system32\java.exe
C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\WINDOWS\system32\UAService7.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
D:\Documents and Settings\TEMP\Desktop\Ny mappe\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - (no file)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.0.0.134\IPSBHO.DLL
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: SWEETIE - {EEE6C35C-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll (file missing)
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ATICCC] "c:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [Vade Retro Outlook Express] "C:\PROGRA~1\GOTOSO~1\VADERE~1\Vaderetro_oe.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [SweetIM] C:\Program Files\SweetIM\Messenger\SweetIM.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] ~"C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\RunOnce: [Shockwave Updater] C:\WINDOWS\system32\Adobe\SHOCKW~1\SWHELP~2.EXE -Update -1100465 -"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; byond_4.0; FunWebProducts; SIMBAR={B3A172C2-468C-4B67-91D8-A666B122ABD7}; GTB6; .NET CLR 1.0.3705; .NET CLR 1.1.4322; .NET CLR 2.0.50727; Media Center PC 4.0; HbTools 4.8.4; .NET CLR 3.0.4506.2152)" -"http://www.mofunzone.com/popups/4_wheel_fury_2.shtml"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKAL TJENESTE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETVÆRKSTJENESTE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Hurtig start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - D:\Documents and Settings\TEMP\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\dan.htm
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.7.109.cab
O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.4.1.cab
O16 - DPF: {4C68DACE-E6BC-4650-9C7E-D036720CA729} (Nps Control) - http://kr.gameguard.nprotect.com/inca/onscan//tyscan/nps.cab
O16 - DPF: {63F5866B-A7C5-40B4-9A89-0CCA99726C8D} (LogMeIn Rescue Applet Downloader) - https://secure.logmeinrescue.com/Customer/x86/RescueDownloader.cab
O16 - DPF: {69EF49E5-FE46-4B92-B5FA-2193AB7A6B8A} (GameLauncher Control) - http://www.acclaim.com/cabs/acclaim_v8.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {99CAAA27-FA0C-4FA4-B88A-4AB1CC7A17FE} (MGLaunch_v1004 Class) - http://ghost.netgame.com/launch/object/mglaunch_USAv1004.cab
O16 - DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} (NeffyLauncherCtl Class) - http://dist.globalgamecdn.com/dist/neffy/NeffyLauncher.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab
O16 - DPF: {BD08A9D5-0E5C-4F42-99A3-C0CB5E860557} (CSolidBrowserObj Object) - http://cdn1.acclaimdownloads.com/solidstateion.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab57213.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C49134CC-B5EF-458C-A442-E8DFE7B4645F} (YYGInstantPlay Control) - http://www.yoyogames.com/downloads/activex/YoYo.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
O16 - DPF: {DB7BF79A-FC51-4B5A-92BC-A65731174380} (InstantAction Game Launcher) - http://www.instantaction.com/download/iaplayer.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\WINDOWS\system32\Skype4COM.dll
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll
O18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatisk LiveUpdate-planlægning - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
O23 - Service: Google Update Service (gupdate1c992c9f5cf9a78) (gupdate1c992c9f5cf9a78) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.0.0.134\ccSvcHst.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: Shoddy Battle Server (shoddybattle) - Unknown owner - C:\Program Files\Shoddy Battle Server\bin\wrapper.exe
O23 - Service: Start BT in service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
O23 - Service: SecuROM User Access Service (V7) (UserAccess7) - Sony DADC Austria AG. - C:\WINDOWS\system32\UAService7.exe

--
End of file - 13480 bytes
17. maj 2009 - 12:51 #16
Se i instalerede programmer om der er noget som helst der ligner ->
Shoddy Battle Server
Afinstall!!!

------------------------------------------------------------------------

Klik på Start->Kør skriv Services.msc og klik OK.
Find Tjenesten (Hvis den er der)
* Shoddy Battle Server (shoddybattle)
* nProtect GameGuard Service (npggsvc)
stop den hvis den kører, højreklik på den og vælg Starttype Deaktiveret.

------------------------------------------------------------------------

Manuel 'oprydning' ->

------------------------------------------------------------------------

Kør en scanning med Hijackthis,
Du får herunder nogle filer, som du skal fixe. Det, du skal gøre, er at sætte et flueben ud for disse filer. Når du har gjort det, så lukker du alle andre vinduer ned. Det er meget vigtigt at det eneste vindue, som er åbent er HijackThis vinduet. Husk også at lukke dette vindue, når du har markeret filerne. Nu må du fixe. Klik på Fix checked.

Det er disse, som skal fixes:

O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - (no file)
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: SWEETIE - {EEE6C35C-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll

O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll (file missing)
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.134\coIEPlg.dll

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

O4 - HKLM\..\Run: [SweetIM] C:\Program Files\SweetIM\Messenger\SweetIM.exe

O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - D:\Documents and Settings\TEMP\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)

O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: Shoddy Battle Server (shoddybattle) - Unknown owner - C:\Program Files\Shoddy Battle Server\bin\wrapper.exe

Genstart normalt...

------------------------------------------------------------------------

Manuelt slet mappen (hvis den findes?)
* C:\Program Files\Shoddy Battle Server\

------------------------------------------------------------------------

Hvordan kører PC'en så nu ?
Avatar billede 1wgoldbergw1 Nybegynder
17. maj 2009 - 13:56 #17
PC'en har fået det bedre :)

2 af fejlene: MFC71.dll og Filnavn Document Viewer filtype instalation package (*.msi) Error code 2761

men Windows Installer er der stadigvæk

Jeg har slettet alle de ting som du sagde inklusiv Shoddy Battle Server

og som du ganske rigtigt sagde

Citat:
Manuelt slet mappen (hvis den findes?)
* C:\Program Files\Shoddy Battle Server


den var der rigtigt nok og er slettet
17. maj 2009 - 15:18 #18
Hent Dial-a-fix på dette link, og gem det på skrivebordet.

Direkte link
http://djlizard.net/software/Dial-a-fix-v0.60.0.24.zip

Brug kun nr. to link, hvis det første ikke virker.

Du får da lige et andet link hvis det ikke lykkedes med det første:
http://djlizard.net/Dial-a-fix-2006-09-19.exe

I det program er et punkt mht fix af "Windows Installer..." - prøv det...
Avatar billede 1wgoldbergw1 Nybegynder
17. maj 2009 - 19:14 #19
Desværre virker det ikke det får det bare til at forsvinde

der for det bare til at ende processen men så kommer der allemulige ting som microsoft network error som man er nød til at klikke på omkring 10 gange før at det forsvinde..

og de andre to problemer er kommet tilbage
17. maj 2009 - 19:36 #20
Hmmm... Andre i denne tråd ?
Avatar billede 1wgoldbergw1 Nybegynder
18. maj 2009 - 20:20 #21
Tak for din hjælp som du har givet.
Jeg bliver væk i et par dage.
Bagefter kommer jeg tilbage til denne tråd igen.
Vi snakkes
Avatar billede 1wgoldbergw1 Nybegynder
24. maj 2009 - 16:28 #22
Jeg er tilbage
håber at du kan give nogle flere tips
ellers må jeg sende den til reperation
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester