Avatar billede bamse19 Praktikant
07. april 2010 - 22:44 Der er 24 kommentarer

langsom pc

Efter min søn har brugt min pc i nogen tid er den blevet meget meget langsom.
Han har downloadet mange ting og der er garanteret programmer der kører i baggrunden, men hvordan gør jeg når jeg ikke har forstand på hvordan jeg får den til at køre godt igen?
Avatar billede 220661 Ekspert
07. april 2010 - 22:49 #1
Styresystem?
Avatar billede bamse19 Praktikant
07. april 2010 - 23:09 #2
øh xp hvis det er det du mener
Avatar billede 220661 Ekspert
07. april 2010 - 23:17 #3
Hent Malwarebytes Antimalware:  http://www.malwarebytes.org/
opdater det og kør en fuld scanning.
Lad den fjerne hvad den finder, og send logfilen her ind.
Hent CCleaner:  http://www.ccleaner.com/
Lad programmet rense din computer. Guide:http://www.spywarefri.dk/manualer/manual-for-installation-og-brug-af-ccleaner/
Avatar billede 220661 Ekspert
07. april 2010 - 23:19 #4
Lukker for idag. På igen i morgen kl 16.
Avatar billede bamse19 Praktikant
08. april 2010 - 06:54 #5
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3967

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

08-04-2010 06:28:47
mbam-log-2010-04-08 (06-28-47).txt

Skanningstype: Fuldstændig skanning (C:\|D:\|)
Objekter skannet: 293938
Tid gået: 2 time(r), 19 minut(ter), 50 sekund(er)

Hukommelses Processorer Inficeret: 0
Hukommelses Moduler Inficeret: 1
Registreringsdatabase Nøgler Inficeret: 115
Registreringsdatabase Værdier Inficeret: 7
Registreringsdatabase Data Objekter Inficeret: 1
Inficerede Mapper: 63
Inficerede Filer: 1477

Hukommelses Processorer Inficeret:
(Ingen skadelige objekter blev fundet)

Hukommelses Moduler Inficeret:
C:\Programmer\MyGlobalSearch\bar\1.bin\MGSBAR.DLL (Adware.MyWebSearch) -> Delete on reboot.

Registreringsdatabase Nøgler Inficeret:
HKEY_CLASSES_ROOT\AppID\{4a40e8fc-c7e4-4f57-9fa4-85dd77402897} (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0ac49246-419b-4ee0-8917-8818daad6a4e} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{51cf80dc-a309-4735-bb11-ef18bf4e3ad9} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{99410cde-6f16-42ce-9d49-3807f78f0287} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f31a5d11-bf0b-4a4e-90af-274f2090aaa6} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6f282b65-56bf-4bd1-a8b2-a4449a05863d} (Adware.Gamesbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{014da6c9-189f-421a-88cd-07cfe51cff10} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{37b85a21-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ef281620-a3a3-4f08-874f-d68cfc9b7945} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{914a8f99-38e4-47ec-b875-2b0653516030} (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{bf1bf02c-5a86-4ecf-adac-472c54c4d21e} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{5b6689b5-c2d4-4dc7-bfd1-24ac17e5fcda} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{37b85a20-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{995e885e-3ff5-4f66-a107-8bfb3a0f8f12} (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\9ee2330ae5f4470cac801baac83818c9 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{99410cde-6f16-42ce-9d49-3807f78f0287} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f31a5d11-bf0b-4a4e-90af-274f2090aaa6} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1a93c934-025b-4c3a-b38e-9654a7003239} (Adware.Gamesbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6f282b65-56bf-4bd1-a8b2-a4449a05863d} (Adware.Gamesbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{42f2c9ba-614f-47c0-b3e3-ecfd34eed658} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a21-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4e7bd74f-2b8d-469e-86bd-fd60bb9aae3a} (Adware.OneToolBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.Softomate) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{bfc08cff-c737-4433-bd5a-0ee7efcfee54} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5929cd6e-2062-44a4-b2c5-2c7e78fbab38} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{e596df5f-4239-4d40-8367-ebadf0165917} (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{09f1adac-76d8-4d0f-99a5-5c907dadb988} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{37b85a21-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{1a93c934-025b-4c3a-b38e-9654a7003239} (Adware.Gamesbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{914a8f99-38e4-47ec-b875-2b0653516030} (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{37b85a21-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{90b5a95a-afd5-4d11-b9bd-a69d53d22226} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{914a8f99-38e4-47ec-b875-2b0653516030} (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\My Global Search Uninstall (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbcoresrv.dynamicprop (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbcoresrv.dynamicprop.1 (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\seekmo.desktopflash (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\seekmo.desktopflash.1 (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\seekmoax.clientdetector (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\seekmoax.clientdetector.1 (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\seekmoax.userprofiles (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\seekmoax.userprofiles.1 (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.clientinstaller.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.requiredcomponent (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.requiredcomponent.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.zangoclientax (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.zangoclientax.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.coreservices (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.lfgax (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.lfgax.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.mailanim (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.mailanim.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.webmailsend (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.webmailsend.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\lmgr180.wmdrmax (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\lmgr180.wmdrmax.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\seekmo.desktopflash (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\seekmo.desktopflash.1 (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\seekmoax.clientdetector (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\seekmoax.clientdetector.1 (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\seekmoax.userprofiles (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\seekmoax.userprofiles.1 (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\srv.coreservices (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\srv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.htmlmenuui (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.htmlmenuui.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.toolbarctl (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.toolbarctl.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\wallpaper.wallpapermanager (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\wallpaper.wallpapermanager.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\seekmo (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\seekmosa (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyGlobalSearch (Adware.BookedSpace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\seekmo (Adware.Seekmo) -> Quarantined and deleted successfully.

Registreringsdatabase Værdier Inficeret:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{4e7bd74f-2b8d-469e-86bd-fd60bb9aae3a} (Adware.OneToolBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.Softomate) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{6f282b65-56bf-4bd1-a8b2-a4449a05863d} (Adware.Gamesbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\(default) (Adware.Hotbar) -> Quarantined and deleted successfully.

Registreringsdatabase Data Objekter Inficeret:
HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.

Inficerede Mapper:
C:\Documents and Settings\All Users\Application Data\2ACA5CC3-0F83-453D-A079-1076FE1A8B65 (Adware.Seekmo) -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\IESkins (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0 (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\dynamic (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\DownLoad (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOL (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOL\dynamic (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOL\static (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOL\static\1 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOL\static\2 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOL\static\DownLoad (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostWD (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostWD\static (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostWD\static\1 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostWD\static\2 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostWD\static\DownLoad (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic (Trojan.Agent) -> Files: 1104 -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic\344stat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic\hstat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML (Trojan.Agent) -> Files: 1196 -> Delete on reboot.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\dynamic\ustat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\static (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\static\1 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\static\2 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\SeekmoOI (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\SeekmoOI\dynamic (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\SeekmoOI\static (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\SeekmoOL (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\SeekmoOL\dynamic (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\SeekmoOL\static (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SeekmoSA (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programmer\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\FunWebProducts\ScreenSaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\FunWebProducts\ScreenSaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\FunWebProducts\Shared (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyWebSearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0 (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0\firefox (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0\firefox\extensions (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0\firefox\extensions\components (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0\firefox\extensions\plugins (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Menuen Start\Programmer\Seekmo (Adware.Seekmo) -> Quarantined and deleted successfully.

Inficerede Filer:
C:\Programmer\MyGlobalSearch\bar\1.bin\MGSBAR.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\ClientAX.dll (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0\SeekmoSADF.exe (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Shared\pretty maids.mp3 (Trojan.Wimad) -> Quarantined and deleted successfully.
C:\Programmer\Windows Live\Messenger\riched20.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar\1.bin\M9PLUGIN.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\MyGlobalSearch\bar\1.bin\NPMYGLSH.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Programmer\Seekmo\bin\10.0.345.0\firefox\extensions\plugins\npclntax_SeekmoSA.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{1BE136E6-1AD8-4129-9795-03F31A6B88D5}\RP1399\A0321840.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1175766166.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1177083350.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1178639832.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1180158541.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1181455710.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1182487629.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1184103537.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\skbar_1185867481.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\020105_bgn28_prv.jpg (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\020105_bgn28_st.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\030105_animi14_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\030105_animi14_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\033102bigblink_1_em.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\033102bigblink_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\040104_ecz2_ec.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\040104_ecz2_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\050104_ecm14_ec.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\050104_ecm14_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103hb01.swf (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103hb01_bg.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103hb01_ec.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103hb01_ec.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103hb01_pre.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103hb01_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103sor_lov009_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\060103sor_lov009_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\080106garf_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\080106garf_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\100103kiss_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\100103kiss_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\100105_animi10_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\100105_animi10_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\100105_animi16_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\100105_animi16_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na10_em.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na10_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na7_em.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na7_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na8_em.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na8_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na9_em.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\110107na9_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\birthday_cute_0329_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\birthday_cute_0329_1_ec.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\birthday_cute_0329_1_ec.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\birthday_cute_0329_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\empty_bg_st.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\FileManager.txt (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\love__mixer_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\love__mixer_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\love__rollerskating_img.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\eskin\love__rollerskating_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte10_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte11_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte12_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte13_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte14_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte19_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte20_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte21_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030104_emte9_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\030203lib_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102angel_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102bigluf_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102bigsmile_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102birthday_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102cheers_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102flo_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102good_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102jump_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102king_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102lough_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102luf_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102smiled_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102smile_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102sor_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102thanx_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\033102uhu_1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\040103ahh_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\040103wow_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\040104_emi2_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\042102_1134_112_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\050103big_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\050103gig_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\050103hm_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\050103nomail_emoti_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\050103norm_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema15_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema16_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema17_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema18_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema19_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema20_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema21_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema24_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema25_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema26_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema30_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema33_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\060104_ema34_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\062802hippi_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\062802jumpie_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\080402argh_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\080402oops_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\080402ouch_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\082502no_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\082502yes_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_boring1_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_confused_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_crying_ugly_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_fantastic_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_feel_better_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_gimme_break_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_heehee_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_hlopaet_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_ign_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_lol_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_no_comment_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_peace_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_smashing_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\110103_talk2thehand_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\blocked.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\blocked2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\block_sm.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\block_sm2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\block_smli.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\block_smli2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_add-but.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_back-but.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_left_cut_enabled_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_left_enabled_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_left_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_middle_enabled_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_middle_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_right_cut_enabled_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_right_enabled_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\btn_right_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\business_promo.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\buttondir.txt (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\components.cdf (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\css2_main.css (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\css2_pagingmodule.css (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\css2_topbuttons.css (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\css_cattree.css (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\css_flashpreview.css (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\cursors.res (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\delete.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\edit_clear_sound.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\edit_fs.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\edit_select.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-543450.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-548964.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-589306.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-591943.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-592579.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-598579.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-603763.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-9595.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511724-9696.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-511745-514279.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-backgrounds.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-bcards.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-ecards.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-emoticons.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-estationery.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-funny.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-help.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-images.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-info.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-more.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-my.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-new.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-new2.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-options.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-people.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-photo.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-tell.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-temp.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-text.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def-email-voice.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-def.cdf (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-premium-email-premium.mnu (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-t1-bg.res (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\email-temp-bg.res (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\estatationery.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\flashpatch.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\flashpreview.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\fs3.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\hotbar_promo.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_checked_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_close_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_close_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_edit_preview.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_edit_send.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_flash_preview.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_recently_used.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_remove_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_remove_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_sand-clock2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_tell_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_tell_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_tree_null.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_unchecked_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\icon_unchecked_pressed_1.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\img_barlayout.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\img_barlayout2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\img_barlayout4.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\img_corner_left.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\img_local_logo.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_basetemplate.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_hbgroups.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_hbobject3.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_hbobjectset3.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_hotbarwrapper.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_iteratorsandreaders3nf.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_pagingmoduleobj3.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_texts3.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\js2_xmltree3nf.js (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\layout.cdf (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\linkpathlegal.txt (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\n.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\nav_bb_2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\nav_b_2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\nav_ff_2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\nav_f_2.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\progress.res (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\sales_buttons.res (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\searchbtn.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\seekmo_btn.res (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\submit.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_bg.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_bga.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_bgia.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_l.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_la.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_lia.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_r.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_ra.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tab_ria.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\treedata_animations.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\treedata_backgrounds.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\treedata_ecards.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\treedata_emoticons.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\treedata_notifiers.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\treedata_text.xml (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tree_dots.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tree_minus.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\1\tree_plus.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte10_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte11_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte12_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte13_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte14_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte19_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte20_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte21_prv.gif (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Ejer\Application Data\Seekmo\v3.0\HostOI\static\2\030104_emte9_prv.gif (Trojan.Agent) -> Quarantined an
Avatar billede 220661 Ekspert
08. april 2010 - 17:57 #6
Jeg har ikke set en mere indficeret pc end din.

Det var da godt nok en masse snavs der var kommet på den. Hvordan kører den nu??

Kan være du skal køre en hijackthis også, men jeg er ikke skrap til det, så jeg håber der er en venlig sjæl til at hjælpe dig med den. Karise Larry er du med på en kigger her?
08. april 2010 - 19:13 #7
Yffer Pyffer !!!

Jo vi skal lige have en 'vejledende' HiJackThis Log ->

... for en go' ordens skyld; stik os/mig en HiJackThis ->
http://www.spywareinfo.dk/index.htm#/manualer/hijackthis.htm

Bemærk at HiJackThis.exe programmet skal gemmes i en dertil oprettet mappe og IKKE køres direkte fra nettet...

PS: Brug denne version af HJT -> http://www.trendsecure.com/portal/en-US/_download/HiJackThis.exe

---

Der kan godt mere mere 'snavs'; det napper vi efter ovenstående ...

---

Du ka' godt gi' din søn et klaps over fingrene *S* ...
Avatar billede 220661 Ekspert
08. april 2010 - 21:04 #8
bamse19 hvad sker der. Kunne computeren ikke tåle "forårsrengøringen"?
08. april 2010 - 21:14 #9
(Fortsatte den måske her -> http://www.eksperten.dk/spm/906483 ?)
Avatar billede 220661 Ekspert
08. april 2010 - 21:31 #10
Han svarer i hvertfald ikke længere i denne tråd.
Avatar billede bamse19 Praktikant
09. april 2010 - 06:59 #11
undskyld jeg ikke svarede i går men var ikke til stede her. :) nu prøver jeg lige de ting i har foreslået og lægger logfiler herinde
Avatar billede bamse19 Praktikant
09. april 2010 - 07:04 #12
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 07:03:50, on 09-04-2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
c:\Programmer\Microsoft Security Essentials\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Programmer\Fælles filer\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Programmer\Bonjour\mDNSResponder.exe
C:\Programmer\ExtraFilm Designer DK\EFUploadSrv.exe
C:\WINDOWS\system32\svchost.exe
C:\Programmer\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Programmer\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Programmer\SPAMfighter\sfus.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Programmer\Fælles filer\MySoftware\Newsflsh.exe
C:\Programmer\iPod\bin\iPodService.exe
C:\Programmer\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Programmer\LevelOne\11g Wireless LAN\WLanUtility.exe
C:\Programmer\Internet Explorer\iexplore.exe
C:\Programmer\Internet Explorer\iexplore.exe
C:\Programmer\Windows Live\Toolbar\wltuser.exe
C:\Programmer\Windows Live\Messenger\msnmsgr.exe
C:\Programmer\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\HP_Ejer\Skrivebord\ilse\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://search.bearshare.com/sidebar.html?src=ssb
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ni.dk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Hyperlinks
O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Programmer\HP\Smart Web Printing\hpswp_printenhancer.dll
O2 - BHO: HP Print Clips - {053F9267-DC04-4294-A72C-58F732D338C0} - C:\Programmer\HP\Smart Web Printing\hpswp_framework.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programmer\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Programmer\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: Hjælp til tilmelding til Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programmer\Fælles filer\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Mario Forever Toolbar Helper - {A20854FD-DDB5-4931-8F76-D11EA2364D94} - (no file)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Programmer\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Programmer\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - (no file)
O2 - BHO: GamesBarBHO Class - {CB0D163C-E9F4-4236-9496-0597E24B23A5} - (no file)
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Programmer\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Programmer\Windows Live\Toolbar\wltcore.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Programmer\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Mario Forever Toolbar - {71B6ACF7-4F0F-4FD8-BB69-6D1A4D271CB7} - (no file)
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Programmer\Windows Live\Toolbar\wltcore.dll
O3 - Toolbar: Searchme Toolbar - {4d02e7e6-5930-4b51-b9b0-9f21b3789400} - mscoree.dll (file missing)
O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Programmer\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect
O4 - HKLM\..\Run: [HPHUPD08] c:\Programmer\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [HP Software Update] C:\Programmer\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [AttuneClientEngine] C:\PROGRA~1\Aveo\Attune\bin\attune_ce.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [WinampAgent] C:\Programmer\Winamp\winampa.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Programmer\Fælles filer\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Programmer\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Programmer\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FLLESF~1\INSTAL~1\UPDATE~1\isuspm.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Programmer\Fælles filer\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [SPAMfighter Agent] "C:\Programmer\SPAMfighter\SFAgent.exe" update delay 60
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programmer\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [MSSE] "c:\Programmer\Microsoft Security Essentials\msseces.exe" -hide -runkey
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] "C:\Programmer\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\HP_Ejer\Lokale indstillinger\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKAL TJENESTE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETVÆRKSTJENESTE')
O4 - HKUS\S-1-5-18\..\Run: [Nokia.PCSync] C:\Programmer\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Nokia.PCSync] C:\Programmer\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog (User 'Default user')
O4 - Global Startup: 11g Wireless LAN Utility.lnk = ?
O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Programmer\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Programmer\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Programmer\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Newsflash.lnk = ?
O8 - Extra context menu item: Add to AMV Converter... - C:\Programmer\MP3 Player Utilities 4.18\AMVConverter\grab.html
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&ksporter til Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Google Sidewiki... - res://C:\Programmer\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
O8 - Extra context menu item: Åbn billede i &Microsoft PhotoDraw - res://C:\PROGRA~1\MICROS~3\Office\1030\phdintl.dll/phdContext.htm
O9 - Extra button: Blog det - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Programmer\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog det i Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Programmer\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Programmer\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: HP Klipsamling - {58ECB495-38F0-49cb-A538-10282ABF65E7} - C:\Programmer\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: HP Smart markering - {700259D7-1666-479a-93B1-3250410481E8} - C:\Programmer\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: Opslag - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Tilslutningshjælp - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Tilslutningshjælp - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programmer\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programmer\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {029FDBA6-3547-11D7-AA4C-0050BF051A00} (Rawflow ICD Client) - http://webnode1.xstream.dk/radiostationer/rawflow/198/Rawflow.cab
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {402EE96E-2CE8-482D-ADA5-CECEEA07E16D} (TurnTool Scene) - http://www.turntool.com/ViewerInstall.exe
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www3.snapfish.dk/SnapfishActivia.cab
O16 - DPF: {5D637FAD-E202-48D1-8F18-5B9C459BD1E3} (Image Uploader Control) - http://www.extrafilm.dk/ImageUploader5.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase9602.cab
O16 - DPF: {62789780-B744-11D0-986B-00609731A21D} (Autodesk MapGuide ActiveX Control) - http://gis.aarhus.dk/Mapguide%20viewer/v65/mgaxctrl.cab
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
O16 - DPF: {8C379EAB-FB26-4B71-BB5C-05B4C96E4851} (Hjemmeside.KvikFoto) - http://www.123hjemmeside.dk/builder/pages/KvikFoto-1-0-5.CAB
O16 - DPF: {CAC677B6-4963-4305-9066-0BD135CD9233} (IPSUploader4 Control) - https://asp.photoprintit.de/microsite/4066/defaults/activex/ips/IPSUploader4.cab
O16 - DPF: {D0C0F75C-683A-4390-A791-1ACFD5599AB8} (Oberon Flash Game Host) - http://gamenextus.oberon-media.com/Gameshell/GameHost/1.0/OberonGameHost.cab
O16 - DPF: {D216644A-C6DB-49D9-BBCF-D38FE7991BF2} (Util Class) - https://udstedelse.certifikat.tdc.dk/csp/authenticode/tdccsp-0506.exe
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D8575CE3-3432-4540-88A9-85A1325D3375} (e-Safekey) - https://netbank.danskebank.dk/html/activex/e-Safekey/DB/e-Safekey.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
O16 - DPF: {EDAF796E-9210-4417-ADDC-2AB18E4F6C27} (Hjemmeside.KvikFoto) - http://www.123hjemmeside.dk/builder/pages/KvikFoto.CAB
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Programmer\Fælles filer\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour-tjeneste (Bonjour Service) - Apple Inc. - C:\Programmer\Bonjour\mDNSResponder.exe
O23 - Service: ExtraFilm upload service (EFUploadSrv) - Textalk AB - C:\Programmer\ExtraFilm Designer DK\EFUploadSrv.exe
O23 - Service: Tjenesten Google Update (gupdate) (gupdate) - Google Inc. - C:\Programmer\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Programmer\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programmer\Fælles filer\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod-tjeneste (iPod Service) - Apple Inc. - C:\Programmer\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Programmer\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: ServiceLayer - Nokia. - C:\Programmer\Nokia\PC Connectivity Solution\ServiceLayer.exe
O23 - Service: SPAMfighter Update Service - SPAMfighter ApS - C:\Programmer\SPAMfighter\sfus.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Programmer\Fælles filer\Symantec Shared\Security Center\SymWSC.exe

--
End of file - 13772 bytes
Avatar billede bamse19 Praktikant
09. april 2010 - 07:07 #13
karise_larry  den anden tråd har jeg gasndke rigtigt også oprettet men det er min bærbare der er helt opppe at køre :) så jeg keder mig ikke p.t.
Avatar billede bamse19 Praktikant
09. april 2010 - 08:54 #14
"ganske" skulle der stå :)
Avatar billede 220661 Ekspert
09. april 2010 - 18:17 #15
Hvordan kører den efter at Malwarebytes har været der?

Hvis vi er heldige kommer KArise Larry tilbage og kigger på Hijakthis filen.
Avatar billede bamse19 Praktikant
09. april 2010 - 18:25 #16
den kører bedre men jeg har en fornemmelse af at der er en del der godt kunne slettes men det har helt sikkert hjulpet...underligt at sidde og lave noget ved sin pc og man ikke aner hvad man har gang i :)
Avatar billede 220661 Ekspert
09. april 2010 - 18:44 #17
Kan godt følge dig på det punkt. Men på den anden side skal vi prise os lykkelige for, at sådanne programmer findes. Ellers havde der kun været et alternativ: Format C og geninstallation.
Avatar billede bamse19 Praktikant
09. april 2010 - 18:52 #18
det har du helt ret i og jeg priser mig lykkelig ove at der er mennesker som jer der gider hjælpe os andre tåber :)
09. april 2010 - 20:43 #19
Kommer nu *S*

---

Du bør/skal opdatere din gamle AcrobatReader ->
http://get.adobe.com/dk/reader/ (FRAklik GoogleToolbar!)

---

Mere check herfra -> http://kundeservice.tdc.dk/testcenter/

---

Afinstall
* Bonjour-tjeneste (Bonjour Service)

---

Ved du selv hvad dette er ->
Mario Forever Toolbar  ?

---

Efterfølgende oprydning/optimering ->

---

Kør en scanning med Hijackthis,
Du får herunder nogle filer, som du skal fixe. Det, du skal gøre, er at sætte et flueben ud for disse filer. Når du har gjort det, så lukker du alle andre vinduer ned. Det er meget vigtigt at det eneste vindue, som er åbent er HijackThis vinduet. Husk også at lukke dette vindue, når du har markeret filerne. Nu må du fixe. Klik på Fix checked.

Det er disse, som skal fixes:

O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Programmer\HP\Smart Web Printing\hpswp_printenhancer.dll
O2 - BHO: HP Print Clips - {053F9267-DC04-4294-A72C-58F732D338C0} - C:\Programmer\HP\Smart Web Printing\hpswp_framework.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Programmer\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: Hjælp til tilmelding til Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programmer\Fælles filer\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Mario Forever Toolbar Helper - {A20854FD-DDB5-4931-8F76-D11EA2364D94} - (no file)

O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - (no file)
O2 - BHO: GamesBarBHO Class - {CB0D163C-E9F4-4236-9496-0597E24B23A5} - (no file)

O3 - Toolbar: Mario Forever Toolbar - {71B6ACF7-4F0F-4FD8-BB69-6D1A4D271CB7} - (no file)
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Programmer\Windows Live\Toolbar\wltcore.dll
O3 - Toolbar: Searchme Toolbar - {4d02e7e6-5930-4b51-b9b0-9f21b3789400} - mscoree.dll (file missing)
O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

O4 - HKLM\..\Run: [WinampAgent] C:\Programmer\Winamp\winampa.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Programmer\Fælles filer\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Programmer\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Programmer\iTunes\iTunesHelper.exe"

O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k

O4 - Global Startup: Adobe Reader Hurtigstart.lnk = C:\Programmer\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Programmer\Microsoft Office\Office\OSA9.EXE

O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Programmer\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: HP Klipsamling - {58ECB495-38F0-49cb-A538-10282ABF65E7} - C:\Programmer\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: HP Smart markering - {700259D7-1666-479a-93B1-3250410481E8} - C:\Programmer\HP\Smart Web Printing\hpswp_extensions.dll

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programmer\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programmer\Messenger\msmsgs.exe

Genstart normalt...

------------------------------------------------------------------------

Hvordan kører PC'en så nu ?
Avatar billede bamse19 Praktikant
14. april 2010 - 07:38 #20
jeg kan ikke komme til at opdatere acrobat..skal jeg køre hijackthis alligevel?
Avatar billede f-arn Guru
14. april 2010 - 22:05 #21
Her bør der køres en Combofix.
Hent og gem Combofix på dit skrivebord:

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

Højreklik på skrivebordet og vælg ny->tekstdokument og kopier det fremhævede ind og gem filen som CFScript.txt

Du skal sikre dig at den ikke kommer til at hedde CFScript.txt.txt

--------------

Killall::
Snapshot::


-------------

Da Combofix kan konflikte med dine sikkerhedsprogrammer er det vigtigt at du deaktiverer dem.

Tag så fat i den nye fil med musen, og før den hen over Combofix-filen, hvorefter du "giver slip" med musen.
http://www.fromsej.saknet.dk/billeder/cfscript.gif


Så skulle Combofix gerne give sig til at arbejde. Muligvis vil den kræve en genstart, hvilket du skal tillade. Du bør ikke klikke på vinduet imens værktøjet kører, idet det kan få din computer til at fryse.
Når Combofix er færdig, og efter det (muligvis) har genstartet, skulle der gerne åbnes en logfil: combofix.txt som ligger her C:\ Combofix.txt

Indholdet af denne fil må du gerne lægge herind.
Avatar billede bamse19 Praktikant
15. april 2010 - 07:06 #22
jeg har nu combofix gemt på skrivebordet men jeg forstår ikke helt hvad det er der er markeret som jeg skal gemme som tekstdokument(er jo bange for at gøre det forkert så derfor er mine spørgsmål måske lidt dumme :)
Avatar billede f-arn Guru
17. april 2010 - 01:03 #23
Start notepad/notesblok og kopier dette ind:

Killall::
Snapshot::


Gem filen samme sted som Combofix. Gem den som  CFScript.txt

Du skal sikre dig at den ikke kommer til at hedde CFScript.txt.tx
Avatar billede bamse19 Praktikant
26. april 2010 - 08:51 #24
Jeg har ikke kunnet komme på nettet i lang tid, så derfor den sene reaktion :) Logfilnedenfor


ComboFix 10-04-21.01 - HP_Ejer 26-04-2010  7:59.1.1 - x86
Microsoft Windows XP Home Edition  5.1.2600.3.1252.45.1030.18.510.234 [GMT 2:00]
Kører fra: c:\documents and settings\HP_Ejer\Skrivebord\ComboFix.exe
Kommandoer benyttet :: c:\documents and settings\HP_Ejer\Skrivebord\CFScript.txt
* Dannede nyt systemgendannelsespunkt
.

(((((((((((((((((((((((((((((((((((((((  Andet, der er slettet  )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Menuen Start\Programmer\Start\Newsflash.lnk
c:\documents and settings\HP_Ejer\System
c:\documents and settings\HP_Ejer\System\win_qs8.jqx
c:\windows\Downloaded Program Files\f3initialsetup1.0.1.1.inf
c:\windows\Downloaded Program Files\popcaploader.inf
c:\windows\system32\AutoRun.inf
c:\windows\system32\Ijl11.dll
c:\windows\system32\zip32.dll
D:\Autorun.inf

.
(((((((((((((((((((((((((((((  Filer skabt fra 2010-03-26 til 2010-04-26  )))))))))))))))))))))))))))))))))))
.

2010-04-21 06:03 . 2010-04-21 06:03    --------    d-----w-    c:\programmer\Audacity
2010-04-21 06:00 . 2008-04-13 18:45    60032    ----a-w-    c:\windows\system32\drivers\USBAUDIO.sys
2010-04-21 06:00 . 2008-04-13 18:45    60032    ----a-w-    c:\windows\system32\dllcache\usbaudio.sys
2010-04-09 09:52 . 2010-04-09 09:52    --------    d-----w-    c:\documents and settings\HP_Ejer\Application Data\OpenOffice.org
2010-04-09 09:27 . 2010-04-09 09:29    --------    d-----w-    c:\programmer\OpenOffice.org 3
2010-04-08 05:00 . 2010-04-08 05:00    --------    d-----w-    c:\programmer\CCleaner
2010-04-07 21:25 . 2010-04-07 21:25    --------    d-----w-    c:\documents and settings\HP_Ejer\Application Data\Malwarebytes
2010-04-07 21:24 . 2010-03-29 22:46    38224    ----a-w-    c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-07 21:24 . 2010-04-07 21:24    --------    d-----w-    c:\documents and settings\All Users\Application Data\Malwarebytes
2010-04-07 21:24 . 2010-03-29 22:45    20824    ----a-w-    c:\windows\system32\drivers\mbam.sys
2010-04-07 21:24 . 2010-04-07 21:24    --------    d-----w-    c:\programmer\Malwarebytes' Anti-Malware
2010-04-01 07:17 . 2010-04-01 07:17    --------    d-----w-    c:\documents and settings\NetworkService\Lokale indstillinger\Application Data\PCHealth

.
((((((((((((((((((((((((((((((((((((((((  Find3M Rapport  ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-26 05:30 . 2009-07-08 11:13    --------    d-----w-    c:\programmer\SPAMfighter
2010-04-09 12:08 . 2006-06-13 21:18    120704    ----a-w-    c:\documents and settings\HP_Ejer\Lokale indstillinger\Application Data\GDIPFONTCACHEV1.DAT
2010-03-31 06:23 . 2009-05-23 23:21    --------    d-----w-    c:\documents and settings\All Users\Application Data\Messenger Plus!
2010-03-31 06:04 . 2004-12-03 19:32    87866    ----a-w-    c:\windows\system32\perfc006.dat
2010-03-31 06:04 . 2004-12-03 19:32    469194    ----a-w-    c:\windows\system32\perfh006.dat
2010-03-25 05:33 . 2009-05-23 23:16    --------    d-----w-    c:\programmer\Messenger Plus! Live
2010-03-24 12:32 . 2007-01-03 00:12    --------    d-----w-    c:\programmer\Mario Forever
2010-03-24 12:31 . 2007-01-22 16:41    --------    d-----w-    c:\programmer\Gamenext
2010-03-24 12:31 . 2007-01-22 16:41    --------    d-----w-    c:\programmer\Fælles filer\Oberon Media
2010-03-24 12:30 . 2009-03-16 13:39    --------    d-----w-    c:\programmer\Ingenious
2010-03-24 12:29 . 2008-10-25 15:22    --------    d-----w-    c:\programmer\Fælles filer\DVDVideoSoft
2010-03-23 08:41 . 2008-07-10 12:13    --------    d-----w-    c:\documents and settings\All Users\Application Data\avg8
2010-03-10 06:17 . 2006-06-14 02:06    420352    ----a-w-    c:\windows\system32\vbscript.dll
2010-02-25 06:18 . 2004-08-27 11:00    916480    ----a-w-    c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2004-08-27 11:00    455680    ----a-w-    c:\windows\system32\drivers\mrxsmb.sys
2010-02-24 08:16 . 2010-03-24 11:35    181632    ------w-    c:\windows\system32\MpSigStub.exe
2010-02-17 12:09 . 2006-06-14 02:19    2192512    ----a-w-    c:\windows\system32\ntoskrnl.exe
2010-02-16 19:09 . 2004-08-27 18:00    2069376    ----a-w-    c:\windows\system32\ntkrnlpa.exe
2010-02-12 10:03 . 2010-03-24 11:29    293376    ------w-    c:\windows\system32\browserchoice.exe
2010-02-12 04:34 . 2006-06-13 22:10    100864    ----a-w-    c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2006-06-14 02:24    226880    ----a-w-    c:\windows\system32\drivers\tcpip6.sys
2008-05-26 09:29 . 2008-05-26 09:29    0    ----a-w-    c:\programmer\temp01
2006-06-14 04:51 . 2006-06-14 04:51    774144    ----a-w-    c:\programmer\RngInterstitial.dll
2006-05-01 04:03 . 2006-06-14 04:06    32    --sha-w-    c:\windows\SMINST\HPCD.SYS
.

(((((((((((((((((((((((((((((((((((  Start steder i reg.basen  ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Bemærk* tomme linier & lovlige standard linier vises ikke 
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{4d02e7e6-5930-4b51-b9b0-9f21b3789400}"= "mscoree.dll" [2008-07-25 282112]

[HKEY_CLASSES_ROOT\clsid\{4d02e7e6-5930-4b51-b9b0-9f21b3789400}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\programmer\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-08-08 68856]
"Google Update"="c:\documents and settings\HP_Ejer\Lokale indstillinger\Application Data\Google\Update\GoogleUpdate.exe" [2009-07-04 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [1998-05-07 52736]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-11-04 7307264]
"nwiz"="nwiz.exe" [2005-11-04 1519616]
"HPHUPD08"="c:\programmer\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe" [2005-06-02 49152]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2004-04-14 233472]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 57344]
"HP Software Update"="c:\programmer\HP\HP Software Update\HPWuSchd2.exe" [2007-03-11 49152]
"AttuneClientEngine"="c:\progra~1\Aveo\Attune\bin\attune_ce.exe" [2000-07-24 356728]
"KBD"="c:\hp\KBD\KBD.EXE" [2005-02-02 61440]
"WinampAgent"="c:\programmer\Winamp\winampa.exe" [2007-05-14 35328]
"TkBellExe"="c:\programmer\Fælles filer\Real\Update_OB\realsched.exe" [2008-11-05 185872]
"QuickTime Task"="c:\programmer\QuickTime\qttask.exe" [2008-11-04 413696]
"iTunesHelper"="c:\programmer\iTunes\iTunesHelper.exe" [2008-11-20 290088]
"ISUSPM Startup"="c:\progra~1\FLLESF~1\INSTAL~1\UPDATE~1\isuspm.exe" [2004-08-09 221184]
"ISUSScheduler"="c:\programmer\Fælles filer\InstallShield\UpdateService\issch.exe" [2004-08-09 81920]
"SPAMfighter Agent"="c:\programmer\SPAMfighter\SFAgent.exe" [2009-06-19 333960]
"SunJavaUpdateSched"="c:\programmer\Java\jre6\bin\jusched.exe" [2009-10-11 149280]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Nokia.PCSync"="c:\programmer\Nokia\Nokia PC Suite 6\PcSync2.exe" [2007-03-27 1744896]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"DWQueuedReporting"="c:\progra~1\FLLESF~1\MICROS~1\DW\dwtrig20.exe" [2007-02-25 437160]

c:\documents and settings\HP_Ejer\Menuen Start\Programmer\Start\
OpenOffice.org 3.2.lnk - c:\programmer\OpenOffice.org 3\program\quickstart.exe [2009-12-15 384000]

c:\documents and settings\All Users\Menuen Start\Programmer\Start\
11g Wireless LAN Utility.lnk - c:\programmer\LevelOne\11g Wireless LAN\WLanUtility.exe [2009-7-28 712704]
Adobe Reader Hurtigstart.lnk - c:\programmer\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]
HP Digital Imaging Monitor.lnk - c:\programmer\HP\Digital Imaging\bin\hpqtra08.exe [2007-3-11 210520]
Microsoft Office.lnk - c:\programmer\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Programmer\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Programmer\\Messenger\\msmsgs.exe"=
"c:\\StubInstaller.exe"=
"c:\\Programmer\\LimeWire\\LimeWire.exe"=
"c:\\Programmer\\SmartFTP Client 2.0\\SmartFTP.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Programmer\\iMesh Applications\\iMesh\\iMesh.exe"=
"c:\\Programmer\\DC++\\DCPlusPlus.exe"=
"c:\\Programmer\\utorrent\\utorrent.exe"=
"c:\\Programmer\\iTunes\\iTunes.exe"=
"c:\\Programmer\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Programmer\\Windows Live\\Sync\\WindowsLiveSync.exe"=

R2 EFUploadSrv;ExtraFilm upload service;c:\programmer\ExtraFilm Designer DK\EFUploadSrv.exe [27-11-2008 16:17 1712128]
R2 SPAMfighter Update Service;SPAMfighter Update Service;c:\programmer\SPAMfighter\sfus.exe [19-06-2009 10:08 189064]
R3 RTLWUSB;11g Wireless USB Adapter;c:\windows\system32\drivers\RTL8187.sys [28-07-2009 12:12 178048]
S2 gupdate;Tjenesten Google Update (gupdate);c:\programmer\Google\Update\GoogleUpdate.exe [23-02-2010 16:05 135664]
S3 nmwcdnsu;Nokia USB Flashing Phone Parent;c:\windows\system32\drivers\nmwcdnsu.sys [25-06-2009 19:24 138112]
S3 nmwcdnsuc;Nokia USB Flashing Generic;c:\windows\system32\drivers\nmwcdnsuc.sys [25-06-2009 19:24 8320]
S3 SjyPkt;SjyPkt; [x]
S3 USBAAPL;Apple Mobile USB Driver;c:\windows\system32\drivers\usbaapl.sys [30-11-2008 10:43 32000]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12    REG_MULTI_SZ      Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt    REG_MULTI_SZ      hpqcxs08 hpqddsvc
.
Indhold af mappen 'Planlagte Opgaver'

2010-01-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\programmer\Apple Software Update\SoftwareUpdate.exe [2008-07-30 10:34]

2010-04-26 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\programmer\Google\Update\GoogleUpdate.exe [2010-02-23 14:05]

2010-04-22 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\programmer\Google\Update\GoogleUpdate.exe [2010-02-23 14:05]

2010-04-20 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4186534368-2271264946-1453903963-1008Core.job
- c:\documents and settings\HP_Ejer\Lokale indstillinger\Application Data\Google\Update\GoogleUpdate.exe [2009-07-04 14:58]

2010-04-26 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4186534368-2271264946-1453903963-1008UA.job
- c:\documents and settings\HP_Ejer\Lokale indstillinger\Application Data\Google\Update\GoogleUpdate.exe [2009-07-04 14:58]

2010-04-26 c:\windows\Tasks\SDMsgUpdate (TE).job
- c:\progra~1\SMARTD~1\Messages\SDNotify.exe [2008-01-08 07:53]

2010-04-26 c:\windows\Tasks\SLOW-PCfighter.job
- c:\programmer\Fighters\SLOW-PCfighter\SLOW-PCfighter.exe [2009-05-14 08:21]

2010-04-26 c:\windows\Tasks\Symantec NetDetect.job
- c:\programmer\Symantec\LiveUpdate\NDETECT.EXE [2006-08-15 12:46]

2010-04-26 c:\windows\Tasks\User_Feed_Synchronization-{AF80B7E9-0B4D-42E6-A81C-418DFCA80A43}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 02:31]
.
.
------- Yderligere scanning -------
.
uStart Page = hxxp://www.ni.dk/
IE: Add to AMV Converter... - c:\programmer\MP3 Player Utilities 4.18\AMVConverter\grab.html
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&ksporter til Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\programmer\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: Åbn billede i &Microsoft PhotoDraw - c:\progra~1\MICROS~3\Office\1030\phdintl.dll/phdContext.htm
Trusted Zone: danskebank.dk\www-2
DPF: Microsoft XML Parser for Java
DPF: {402EE96E-2CE8-482D-ADA5-CECEEA07E16D} - hxxp://www.turntool.com/ViewerInstall.exe
DPF: {8C379EAB-FB26-4B71-BB5C-05B4C96E4851} - hxxp://www.123hjemmeside.dk/builder/pages/KvikFoto-1-0-5.CAB
DPF: {D216644A-C6DB-49D9-BBCF-D38FE7991BF2} - hxxps://udstedelse.certifikat.tdc.dk/csp/authenticode/tdccsp-0506.exe
DPF: {D8575CE3-3432-4540-88A9-85A1325D3375} - hxxps://netbank.danskebank.dk/html/activex/e-Safekey/DB/e-Safekey.cab
DPF: {EDAF796E-9210-4417-ADDC-2AB18E4F6C27} - hxxp://www.123hjemmeside.dk/builder/pages/KvikFoto.CAB
FF - ProfilePath - c:\documents and settings\HP_Ejer\Application Data\Mozilla\Firefox\Profiles\6tor6of1.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Yahoo! Search
FF - prefs.js: keyword.URL - hxxp://dk.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_dk&p=
FF - plugin: c:\program files\Real\RealPlayer\Netscape6\nppl3260.dll
FF - plugin: c:\program files\Real\RealPlayer\Netscape6\nprjplug.dll
FF - plugin: c:\program files\Real\RealPlayer\Netscape6\nprpjplug.dll
FF - plugin: c:\programmer\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\programmer\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\programmer\Real\RealArcade\Plugins\Mozilla\npracplug.dll
FF - plugin: c:\programmer\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLITIKKER ----
c:\programmer\Mozilla Firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".dk");
.
- - - - TOMME GENVEJE FJERNET - - - -

Toolbar-Locked - (no file)
Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
WebBrowser-{EEE6C35B-6118-11DC-9C72-001320C79847} - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-26 08:12
Windows 5.1.2600 Service Pack 3 NTFS

scanner skjulte processer ... 

scanner skjulte autostarter ...

scanner skjulte filer ... 

scanning gennemført med succes
skjulte filer: 0

**************************************************************************
.
--------------------- DLLs startet under kørende Processer ---------------------

- - - - - - - > 'explorer.exe'(3836)
c:\windows\system32\nview.dll
c:\windows\system32\NVWRSDA.DLL
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\programmer\Nokia\Nokia PC Suite 6\PhoneBrowser.dll
c:\programmer\Nokia\Nokia PC Suite 6\PCSCM.dll
c:\programmer\Nokia\Nokia PC Suite 6\Lang\PhoneBrowser_dan.nlr
c:\programmer\Nokia\Nokia PC Suite 6\Resource\PhoneBrowser_Nokia.ngr
.
------------------------ Andre kørende processer ------------------------
.
c:\programmer\Fælles filer\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\programmer\Java\jre6\bin\jqs.exe
c:\windows\system32\nvsvc32.exe
c:\programmer\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\rundll32.exe
c:\windows\ALCXMNTR.EXE
c:\windows\system32\msiexec.exe
c:\programmer\OpenOffice.org 3\program\soffice.exe
c:\programmer\OpenOffice.org 3\program\soffice.bin
c:\windows\system32\MsiExec.exe
c:\programmer\iPod\bin\iPodService.exe
c:\windows\system32\imapi.exe
.
**************************************************************************
.
Gennemført tid: 2010-04-26  08:25:52 - maskinen blev genstartet
ComboFix-quarantined-files.txt  2010-04-26 06:25

Pre-Kørsel: 196.378.836.992 byte ledig
Post-Kørsel: 199.856.730.112 byte ledig

- - End Of File - - 953F42DCF5202AD0692DE5F8A4D9AB67
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester