We’d like to remind Forumites to please avoid political debate on the Forum.

This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.

📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!

Items keep reappearing on Reboot and Slowing PC - Hijack this and Combo Fix attached

24

Comments

  • Anic
    Anic Posts: 845 Forumite
    Part of the Furniture Combo Breaker
    Thanks

    I just re-ran MBAM after rebooting and I was surprised it didn't come back clean. This is the new log

    Malwarebytes' Anti-Malware 1.34
    Database version: 1749
    Windows 5.1.2600 Service Pack 3
    17/02/2009 18:17:51
    mbam-log-2009-02-17 (18-17-51).txt
    Scan type: Quick Scan
    Objects scanned: 97718
    Time elapsed: 35 minute(s), 40 second(s)
    Memory Processes Infected: 1
    Memory Modules Infected: 0
    Registry Keys Infected: 6
    Registry Values Infected: 2
    Registry Data Items Infected: 3
    Folders Infected: 4
    Files Infected: 17
    Memory Processes Infected:
    C:\WINDOWS\services.exe (Backdoor.ProRat) -> Unloaded process successfully.
    Memory Modules Infected:
    (No malicious items detected)
    Registry Keys Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{d5bf4552-94f1-42bd-f434-3604812c807d} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{af2e62b6-f9e1-4d4f-a10a-9dc8e6dcbcc0} (Adware.VideoEgg) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CMVideo.XMLDOMDocumentEventsSink (Trojan.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CMVideo.XMLDOMDocumentEventsSink.1 (Trojan.BHO) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Screensavers.com (Adware.Comet) -> Quarantined and deleted successfully.
    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{d5bf4552-94f1-42bd-f434-3604812c807d} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services (Trojan.Agent) -> Quarantined and deleted successfully.
    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SecurityProviders (Trojan.Agent) -> Data: digeste.dll -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    Folders Infected:
    C:\Documents and Settings\john\Application Data\VideoEgg (Adware.VideoEgg) -> Quarantined and deleted successfully.
    C:\Documents and Settings\john\Application Data\VideoEgg\Publisher (Adware.VideoEgg) -> Quarantined and deleted successfully.
    C:\Documents and Settings\john\Application Data\VideoEgg\Publisher\4115 (Adware.VideoEgg) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Start Menu\Programs\XP_AntiSpyware (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
    Files Infected:
    C:\Documents and Settings\Anne\Start Menu\Programs\XP_AntiSpyware\Uninstall.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Start Menu\Programs\XP_AntiSpyware\XP_AntiSpyware.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Desktop\XP_AntiSpyware.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Application Data\Microsoft\Internet Explorer\Quick Launch\XP_AntiSpyware.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\TDSSosvn.dat (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\shell31.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\wpv291233948299.cpx (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\digeste.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\services.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\Fonts\acrsecB.fon (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\Fonts\acrsecI.fon (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\wini10801.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn4 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn5 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn6 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn9 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\TDSSfpmp.dll (Rootkit.Agent) -> Quarantined and deleted successfully.


    I've downloaded Hijack this so will run this and post back
  • Anic
    Anic Posts: 845 Forumite
    Part of the Furniture Combo Breaker
    Hiya,

    Hopefully you can help. This is the Hijack This Log but I don't have a clue what to do next


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 19:20:08, on 17/02/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\zHotkey.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.medion.co.uk
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;*.local
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
    O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [lrijh8s73jhbfgfd] C:\WINDOWS\TEMP\winlognn.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
    O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
    O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [tezrtsjhfr84iusjfo84f] C:\DOCUME~1\Anne\LOCALS~1\Temp\csrssc.exe
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [phnfvrcj.exe] C:\WINDOWS\phnfvrcj.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
    O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
    O4 - Global Startup: broadband medic.lnk = C:\Program Files\ntl\broadband medic\bin\matcli.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.medion.co.uk
    O15 - Trusted Zone: *.musicmatch.com
    O15 - Trusted Zone: *.musicmatch.com (HKLM)
    O16 - DPF: !!138E6DC9-722B-4F4B-B09D-95D191869696} (Bebo Uploader Control) - http://www.bebo.com/files/BeboUploader.5.1.4.cab
    O16 - DPF: !!17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: !!2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
    O16 - DPF: !!6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1123753183109
    O16 - DPF: !!6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1123758956265
    O16 - DPF: !!8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O20 - AppInit_DLLs: karna.dat
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\services.exe (file missing)
    --
    End of file - 6954 bytes
  • Please update Malware bytes - Update Tab - you are running old definitions.

    I see that a memory process has been removed in a previous log and again in this later log. An update may alter this.

    On second glance - the MBAM Logs look the same. Please update and then post a fresh log.
  • Anic wrote: »
    Thanks
    C:\WINDOWS\system32\TDSSfpmp.dll (Rootkit.Agent) ->

    This worrys me - TDSS Rootkit.


    Download ComboFix from one of these locations:

    Link 1
    Link 2
    Link 3

    * IMPORTANT !!! Save ComboFix.exe to your Desktop

    • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

    • Double click on ComboFix.exe & follow the prompts.

    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

    RcAuto1.gif


    Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    whatnext.png


    Click on Yes, to continue scanning for malware.

    When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
  • GunJack
    GunJack Posts: 11,930 Forumite
    Part of the Furniture 10,000 Posts Name Dropper Photogenic
    I googled this...and found this:-

    http://forums.whatthetech.com/Computer_infested_virus_Trojan_Even_format_didn_t99700.html

    right persistent little blighters by the look of it....

    try downloading, updating and running superantispyware...they didn' try it on that forum, but would be worth a go...



    edit:- oops !!!!! THAT'LL TEACH ME to check before I post....if the reluctant one is on the case, I'll keep quiet, watch, and learn :)
    ......Gettin' There, Wherever There is......

    I have a dodgy "i" key, so ignore spelling errors due to "i" issues, ...I blame Apple :D
  • Anic
    Anic Posts: 845 Forumite
    Part of the Furniture Combo Breaker
    Sorry everyone - I got called away


    Apologies for posting the wrong MBAM Log

    This was actually the second log that was generated

    Malwarebytes' Anti-Malware 1.34
    Database version: 1771
    Windows 5.1.2600 Service Pack 3
    17/02/2009 19:06:59
    mbam-log-2009-02-17 (19-06-59).txt
    Scan type: Quick Scan
    Objects scanned: 103499
    Time elapsed: 20 minute(s), 57 second(s)
    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 7
    Registry Data Items Infected: 0
    Folders Infected: 21
    Files Infected: 39
    Memory Processes Infected:
    (No malicious items detected)
    Memory Modules Infected:
    (No malicious items detected)
    Registry Keys Infected:
    (No malicious items detected)
    Registry Values Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\[system] (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rs32net (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxuqiviyifan (Trojan.Agent) -> Delete on reboot.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhedav (Trojan.Agent) -> Delete on reboot.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svschost.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    Registry Data Items Infected:
    (No malicious items detected)
    Folders Infected:
    C:\Documents and Settings\Kieran\Application Data\Starware316 (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\BrowserSearch (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Configurator (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ErrorSearch (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Games (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Layouts (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Manager (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Movies (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Reference (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\RelatedSearch (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Screensavers (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ScreensaversMarketingSitePager (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchAssistPlus (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch\searchMatchPages (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Toolbar (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarLogo (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarSearch (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\TravelSearch (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Weather (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Program Files\CMVideoPlugin (Trojan.BHO) -> Quarantined and deleted successfully.
    Files Infected:
    C:\Documents and Settings\Kieran\Application Data\Starware316\BrowserSearch\BrowserSearch.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\BrowserSearch\BrowserSearch.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Configurator\Configurator.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Configurator\Configurator.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ErrorSearch\ErrorSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ErrorSearch\ErrorSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Games\GamesOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Games\GamesOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Layouts\ToolbarLayout.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Layouts\ToolbarLayout.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Manager\ManagerOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Manager\ManagerOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Movies\MoviesOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Movies\MoviesOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Reference\ReferenceOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Reference\ReferenceOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\RelatedSearch\RelatedSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\RelatedSearch\RelatedSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Screensavers\ScreensaversOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Screensavers\ScreensaversOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ScreensaversMarketingSitePager\ScreensaversMarketingSitePagerOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ScreensaversMarketingSitePager\ScreensaversMarketingSitePagerOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchAssistPlus\SearchAssistPlusOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchAssistPlus\SearchAssistPlusOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch\SearchMatchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch\SearchMatchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Toolbar\TBProductsOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Toolbar\TBProductsOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarLogo\ToolbarLogoOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarLogo\ToolbarLogoOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarSearch\ToolbarSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarSearch\ToolbarSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\TravelSearch\TravelSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\TravelSearch\TravelSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Weather\AlertArchive.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Weather\WeatherOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Kieran\Application Data\Starware316\Weather\WeatherOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
    C:\WINDOWS\Oqanadosexa.dll (Trojan.Agent) -> Delete on reboot.
    C:\WINDOWS\arujahiga.dll (Trojan.Agent) -> Delete on reboot.
  • Anic
    Anic Posts: 845 Forumite
    Part of the Furniture Combo Breaker
    This was the Super Anti Spyware Log

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com
    Generated 02/17/2009 at 07:45 PM
    Application Version : 4.25.1012
    Core Rules Database Version : 3763
    Trace Rules Database Version: 1724
    Scan type : Quick Scan
    Total Scan Time : 00:14:37
    Memory items scanned : 449
    Memory threats detected : 0
    Registry items scanned : 413
    Registry threats detected : 6
    File items scanned : 9060
    File threats detected : 80
    Rootkit.Dopper/ETH
    HKLM\System\ControlSet001\Services\ethsfzup
    C:\WINDOWS\SYSTEM32\DRIVERS\ETHSFZUP.SYS
    HKLM\System\ControlSet001\Enum\Root\LEGACY_ethsfzup
    HKLM\System\ControlSet003\Services\ethsfzup
    HKLM\System\ControlSet003\Enum\Root\LEGACY_ethsfzup
    HKLM\System\CurrentControlSet\Services\ethsfzup
    HKLM\System\CurrentControlSet\Enum\Root\LEGACY_ethsfzup
    Adware.Tracking Cookie
    server.iad.liveperson.net [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    server.iad.liveperson.net [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .apmebf.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .bs.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .kontera.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    .kontera.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
    C:\Documents and Settings\Gillian\Cookies\gillian@nickelodeonuk.112.2o7[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ads.stardoll[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@questionmarket[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@nbads[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@mediaservices.myspace[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@stats.channel4[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ads.tibaco[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@starware[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@overture[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@tradedoubler[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ehg-debenhams.hitbox[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ads.aol.co[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@h.starware[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@try.starware[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ads.habbogroup[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@teentrendsgirls.everythinggirl[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@videoegg.adbureau[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@apmebf[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@try.screensavers[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@www.screensavers[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ads.tnt[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@screensavers.us.intellitxt[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@ads.adbrite[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@eyewonder[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@track.searchignite[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@hitbox[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@2o7[2].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@statse.webtrendslive[1].txt
    C:\Documents and Settings\Gillian\Cookies\gillian@data2.perf.overture[1].txt
    .kontera.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .kontera.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .adrevolver.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .adrevolver.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .tribalfusion.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    ad.yieldmanager.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .burstnet.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    media.adrevolver.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .adviva.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .adviva.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    eas.apm.emediate.eu [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    ad.yieldmanager.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    eas.apm.emediate.eu [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .247realmedia.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .247realmedia.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .247realmedia.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .doubleclick.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .atdmt.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .kaspersky.122.2o7.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .advertising.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .mediaplex.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .apmebf.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    .revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    www.googleadservices.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
    C:\Documents and Settings\john\Cookies\john@atdmt[2].txt
    C:\Documents and Settings\john\Cookies\john@at.atwola[2].txt
    C:\Documents and Settings\john\Cookies\john@www.virginmedia[1].txt
    C:\Documents and Settings\john\Cookies\john@247realmedia[2].txt
    C:\Documents and Settings\john\Cookies\john@ad.zanox[1].txt
    C:\Documents and Settings\john\Cookies\john@help2.virginmedia[1].txt
    C:\Documents and Settings\john\Cookies\john@kontera[2].txt
    C:\Documents and Settings\john\Cookies\john@tacoda[2].txt
    C:\Documents and Settings\john\Cookies\john@virginmedia[2].txt
    C:\Documents and Settings\john\Local Settings\Temp\Cookies\john@virginmedia[2].txt
    C:\Documents and Settings\john\Local Settings\Temp\Cookies\john@www.virginmedia[1].txt

    I
  • Anic
    Anic Posts: 845 Forumite
    Part of the Furniture Combo Breaker
    This is the updated Hijack This Log after running Super Anti Spyware

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 21:35:29, on 17/02/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
    Boot mode: Normal
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\zHotkey.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.medion.co.uk
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;*.local
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
    O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [lrijh8s73jhbfgfd] C:\WINDOWS\TEMP\winlognn.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
    O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
    O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [phnfvrcj.exe] C:\WINDOWS\phnfvrcj.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
    O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
    O4 - Global Startup: broadband medic.lnk = C:\Program Files\ntl\broadband medic\bin\matcli.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.medion.co.uk
    O15 - Trusted Zone: *.musicmatch.com
    O15 - Trusted Zone: *.musicmatch.com (HKLM)
    O16 - DPF: !!138E6DC9-722B-4F4B-B09D-95D191869696} (Bebo Uploader Control) - http://www.bebo.com/files/BeboUploader.5.1.4.cab
    O16 - DPF: !!17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: !!2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
    O16 - DPF: !!6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1123753183109
    O16 - DPF: !!6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1123758956265
    O16 - DPF: !!8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O20 - AppInit_DLLs: karna.dat
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\services.exe (file missing)
    --
    End of file - 7272 bytes
  • Can you run ComboFix as in Post#15
  • Anic
    Anic Posts: 845 Forumite
    Part of the Furniture Combo Breaker
    Just finished the Combofix scan. This is the log



    ComboFix 09-02-15.01 - Anne 2009-02-17 21:44:10.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.247.72 [GMT 0:00]
    Running from: c:\documents and settings\Anne\Desktop\ComboFix.exe
    AV: avast! antivirus 4.8.1335 [VPS 090216-1] *On-access scanning disabled* (Updated)
    * Created a new restore point
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    c:\documents and settings\Anne\Cookies\apanasirav.vbs
    c:\documents and settings\Anne\Cookies\mexys.pif
    c:\documents and settings\Anne\Cookies\puqesami.com
    c:\documents and settings\Anne\Cookies\ryvuxyqo.bin
    c:\documents and settings\Anne\Cookies\sily.dat
    c:\documents and settings\Anne\Cookies\vafygaxex.inf
    c:\documents and settings\Anne\Cookies\xugy.pif
    c:\windows\eyoyamukohiyima.dll
    c:\windows\system32\drivers\str.sys
    .
    ((((((((((((((((((((((((( Files Created from 2009-01-17 to 2009-02-17 )))))))))))))))))))))))))))))))
    .
    2009-02-17 19:28 . 2009-02-17 19:28 <DIR> d
    c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2009-02-17 19:27 . 2009-02-17 19:27 <DIR> d
    c:\program files\SUPERAntiSpyware
    2009-02-17 19:27 . 2009-02-17 19:27 <DIR> d
    c:\documents and settings\Anne\Application Data\SUPERAntiSpyware.com
    2009-02-17 19:19 . 2009-02-17 19:19 <DIR> d
    c:\program files\Trend Micro
    2009-02-17 17:34 . 2009-02-17 17:34 <DIR> d
    c:\program files\Malwarebytes' Anti-Malware
    2009-02-17 17:34 . 2009-02-17 17:34 <DIR> d
    c:\documents and settings\Anne\Application Data\Malwarebytes
    2009-02-17 17:34 . 2009-02-17 17:34 <DIR> d
    c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-02-17 17:34 . 2009-02-11 10:19 38,496 --a
    c:\windows\system32\drivers\mbamswissarmy.sys
    2009-02-17 17:34 . 2009-02-11 10:19 15,504 --a
    c:\windows\system32\drivers\mbam.sys
    2009-02-15 13:15 . 2009-02-15 13:49 <DIR> d
    c:\documents and settings\Anne\Application Data\HouseCall 6.6
    2009-02-15 12:15 . 2009-02-15 12:15 <DIR> d
    c:\program files\CCleaner
    2009-02-13 22:14 . 2009-02-13 22:14 <DIR> d
    c:\program files\Alwil Software
    2009-02-13 20:29 . 2009-02-17 19:27 <DIR> d
    c:\program files\Common Files\Wise Installation Wizard
    2009-02-13 20:22 . 2009-02-13 20:22 <DIR> d
    c:\documents and settings\All Users\Application Data\TEMP
    2009-02-13 19:48 . 2009-02-13 20:23 <DIR> d
    c:\program files\SpywareBlaster
    2009-02-07 09:34 . 2008-07-31 22:17 9,200
    c:\windows\system32\drivers\cdralw2k.sys
    2009-02-07 09:34 . 2008-07-31 22:17 9,072
    c:\windows\system32\drivers\cdr4_xp.sys
    2009-02-06 22:44 . 2009-02-06 22:44 <DIR> d
    c:\documents and settings\john\Application Data\Talkback
    2009-02-06 22:35 . 2004-04-27 04:40 11,264 --a
    c:\windows\system32\SpOrder.dll
    2009-02-06 21:45 . 2009-02-06 21:45 <DIR> d--h
    c:\windows\PIF
    2009-02-06 20:53 . 2009-02-06 20:59 <DIR> d
    c:\documents and settings\All Users\Application Data\Lavasoft
    2009-02-06 20:09 . 2009-02-13 20:30 <DIR> d
    c:\program files\Lavasoft
    2009-02-06 20:09 . 2009-02-06 20:55 <DIR> d
    c:\documents and settings\john\Application Data\Lavasoft
    2009-01-28 17:18 . 2009-01-31 19:25 124 --a
    c:\windows\adobe.bat
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-02-13 22:10
    d
    w c:\program files\InstallShield Installation Information
    2009-02-13 21:38
    d
    w c:\documents and settings\All Users\Application Data\Viewpoint
    2009-02-13 21:37
    d
    w c:\documents and settings\Anne\Application Data\Virgin Broadband
    2009-02-13 21:37
    d
    w c:\documents and settings\All Users\Application Data\Virgin Broadband
    2009-02-07 09:33
    d
    w c:\program files\Google
    2009-02-06 22:30
    d
    w c:\documents and settings\john\Application Data\Virgin Broadband
    2009-02-06 21:17
    d
    w c:\documents and settings\Gillian\Application Data\Virgin Broadband
    2009-02-06 20:08
    d
    w c:\documents and settings\Anne\Application Data\Lavasoft
    2009-02-06 20:03
    d
    w c:\program files\Spybot - Search & Destroy
    2009-01-29 16:25
    d
    w c:\documents and settings\Gillian\Application Data\LimeWire
    2009-01-21 15:39
    d
    w c:\documents and settings\Anne\Application Data\LimeWire
    2009-01-13 22:03
    d
    w c:\program files\Lexmark X1100 Series
    2008-12-25 17:58
    d
    w c:\program files\iTunes
    2008-12-25 17:58
    d
    w c:\documents and settings\All Users\Application Data\!!3276BE95_AF08_429F_A64F_CA64CB79BCF6}
    2008-12-25 17:57
    d
    w c:\program files\iPod
    2008-12-25 17:53
    d
    w c:\program files\QuickTime
    2008-12-25 17:49
    d
    w c:\program files\Apple Software Update
    2008-11-02 23:50 19,790 ----a-w c:\program files\Common Files\cowubucify.dat
    2008-11-02 23:50 18,372 ----a-w c:\program files\Common Files\axukoji._sy
    2008-11-02 23:50 17,151 ----a-w c:\program files\Common Files\mymeq.exe
    2008-11-02 23:50 16,952 ----a-w c:\documents and settings\All Users\Application Data\leterewi.sys
    2008-11-02 23:50 13,618 ----a-w c:\documents and settings\Anne\Application Data\cujeca.dat
    2008-11-02 23:50 13,597 ----a-w c:\program files\Common Files\vabodu._sy
    2008-11-02 23:50 10,680 ----a-w c:\program files\Common Files\tepobot.dll
    2008-11-02 23:50 10,347 ----a-w c:\documents and settings\All Users\Application Data\pimymuzyho.dat
    2008-10-19 22:37 19,045 ----a-w c:\documents and settings\Anne\Application Data\udifexen.pif
    2008-10-19 22:37 17,532 ----a-w c:\program files\Common Files\ysyva.scr
    2008-10-19 22:37 16,155 ----a-w c:\program files\Common Files\tite.bin
    2008-10-19 22:37 15,156 ----a-w c:\documents and settings\All Users\Application Data\oweveg.dll
    2008-10-19 22:37 13,617 ----a-w c:\documents and settings\Anne\Application Data\qotup.bat
    2008-10-19 22:37 13,395 ----a-w c:\documents and settings\Anne\Application Data\ginutocuqa.vbs
    2007-02-15 17:38 29,840 ----a-w c:\documents and settings\Anne\Application Data\GDIPFONTCACHEV1.DAT
    2009-02-06 22:53 67,696 ----a-w c:\program files\mozilla firefox\components\jar50.dll
    2009-02-06 22:53 54,376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
    2009-02-06 22:53 34,952 ----a-w c:\program files\mozilla firefox\components\myspell.dll
    2009-02-06 22:53 46,720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
    2009-02-06 22:53 172,144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2005-05-31 1415824]
    "SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-01-15 1830128]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]
    "avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-02-05 81000]
    "HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-06-08 77824]
    "Lexmark X1100 Series"="c:\program files\Lexmark X1100 Series\lxbkbmgr.exe" [2003-08-19 57344]
    "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-11-04 413696]
    "Persistence"="c:\windows\system32\igfxpers.exe" [2005-06-08 114688]
    "NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
    "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-11-20 290088]
    "IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-06-08 94208]
    "SoundMan"="SOUNDMAN.EXE" [2005-03-25 c:\windows\SOUNDMAN.EXE]
    "CHotkey"="zHotkey.exe" [2004-05-17 c:\windows\zHotkey.exe]
    "AGRSMMSG"="AGRSMMSG.exe" [2005-03-08 c:\windows\AGRSMMSG.exe]
    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe [2008-01-11 39792]
    Adobe Reader Synchronizer.lnk - c:\program files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe [2007-05-10 738968]
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
    "ForceClassicControlPanel"= 1 (0x1)
    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "!!5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2008-12-22 11:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "VIDC.VQC4"= VQ318DEC.dll
    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusDisableNotify"=dword:00000001
    "UpdatesDisableNotify"=dword:00000001
    "FirewallOverride"=dword:00000001
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe"=
    "c:\\Program Files\\Messenger\\msmsgs.exe"=
    "c:\\Program Files\\AOL 9.0\\AOL.exe"=
    "c:\\Program Files\\AOL 9.0\\WAOL.exe"=
    "c:\\WINDOWS\\system32\\fxsclnt.exe"=
    "c:\\Program Files\\NetMeeting\\Conf.exe"=
    "c:\\Program Files\\Ahead\\Nero MediaHome\\NeroMediaHome.exe"=
    "c:\\StubInstaller.exe"=
    "c:\\WINDOWS\\system32\\LEXPPS.EXE"=
    "c:\\WINDOWS\\system32\\rtcshare.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "%windir%\\system32\\sessmgr.exe"=
    "c:\\Program Files\\iTunes\\iTunes.exe"=
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "8814:TCP"= 8814:TCP:ppLive
    "2147:UDP"= 2147:UDP:ppLive
    "3401:UDP"= 3401:UDP:Windows Media Format SDK (IEXPLORE.EXE)
    "3400:UDP"= 3400:UDP:Windows Media Format SDK (IEXPLORE.EXE)
    R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-02-13 114768]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2009-01-15 8944]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2009-01-15 55024]
    R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-02-13 20560]
    R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-01-15 7408]
    S3 DCamUSBLTN;M318B Digital Video Camera;c:\windows\system32\drivers\vq318vid.sys [2002-04-22 113632]
    S3 k600bus;Sony Ericsson 600i driver (WDM);c:\windows\system32\drivers\k600bus.sys [2005-03-04 52384]
    S3 k600mdfl;Sony Ericsson 600i USB WMC Modem Filter;c:\windows\system32\drivers\k600mdfl.sys [2006-03-27 6096]
    S3 k600mdm;Sony Ericsson 600i USB WMC Modem Drivers;c:\windows\system32\drivers\k600mdm.sys [2006-03-27 87456]
    --- Other Services/Drivers In Memory ---
    *Deregistered* - Netman
    *Deregistered* - Nla
    *Deregistered* - PolicyAgent
    *Deregistered* - ProtectedStorage
    *Deregistered* - RasMan
    *Deregistered* - RpcSs
    *Deregistered* - SamSs
    *Deregistered* - Schedule
    *Deregistered* - seclogon
    *Deregistered* - SENS
    *Deregistered* - SharedAccess
    *Deregistered* - ShellHWDetection
    *Deregistered* - Spooler
    *Deregistered* - srservice
    *Deregistered* - SSDPSRV
    *Deregistered* - stisvc
    *Deregistered* - TapiSrv
    *Deregistered* - TermService
    *Deregistered* - Themes
    *Deregistered* - TrkWks
    *Deregistered* - W32Time
    *Deregistered* - WebClient
    *Deregistered* - winmgmt
    *Deregistered* - wscsvc
    *Deregistered* - wuauserv
    *Deregistered* - WZCSVC
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\!!2b8891d0-f115-11dc-93b3-0013d392c389}]
    \Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL http://www.mgae.com/keylauncher/?code=3654331620309651
    .
    Contents of the 'Scheduled Tasks' folder
    2009-01-31 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]
    .
    - - - - ORPHANS REMOVED - - - -
    HKCU-Run-swg - c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    HKCU-Run-phnfvrcj.exe - c:\windows\phnfvrcj.exe
    HKLM-Run-ZoneAlarm Client - c:\program files\Zone Labs\ZoneAlarm\zlclient.exe
    HKLM-Run-BJCFD - c:\program files\BroadJump\Client Foundation\CFD.exe
    HKLM-Run-AOLDialer - c:\program files\Common Files\AOL\ACS\AOLDial.exe
    SafeBoot-ati3glxx.sys
    SafeBoot-ati3otxx.sys
    SafeBoot-ati8ntxx.sys
    MSConfigStartUp-tezrtsjhfr84iusjfo84f - c:\docume~1\Anne\LOCALS~1\Temp\csrssc.exe

    .
    Supplementary Scan
    .
    uStart Page = hxxp://www.google.com
    uDefault_Search_URL = hxxp://www.google.com/ie
    mStart Page = hxxp://www.google.com
    uInternet Settings,ProxyOverride = 127.0.0.1;*.local
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
    Trusted Zone: musicmatch.com
    Trusted Zone: musicmatch.com
    DPF: Microsoft XML Parser for Java - [URL]file://c:\windows\Java\classes\xmldso.cab[/URL]
    FF - ProfilePath - c:\documents and settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\
    FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
    FF - prefs.js: browser.search.selectedEngine - Google
    FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
    FF - component: c:\program files\Mozilla Firefox\extensions\talkback@mozilla.org\components\qfaservices.dll
    .
    **************************************************************************
    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-02-17 21:55:23
    Windows 5.1.2600 Service Pack 3 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    .
    DLLs Loaded Under Running Processes
    - - - - - - - > 'winlogon.exe'(380)
    c:\program files\SUPERAntiSpyware\SASWINLO.dll
    .
    Other Running Processes
    .
    c:\program files\Lavasoft\Ad-Aware\aawservice.exe
    c:\program files\Alwil Software\Avast4\aswUpdSv.exe
    c:\program files\Alwil Software\Avast4\ashServ.exe
    c:\windows\system32\LEXBCES.EXE
    c:\windows\system32\LEXPPS.EXE
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\program files\Lexmark X1100 Series\lxbkbmon.exe
    c:\program files\Alwil Software\Avast4\ashMaiSv.exe
    c:\program files\iPod\bin\iPodService.exe
    c:\program files\Alwil Software\Avast4\ashWebSv.exe
    .
    **************************************************************************
    .
    Completion time: 2009-02-17 22:03:05 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-02-17 22:02:57
    Pre-Run: 17,295,196,160 bytes free
    Post-Run: 18,879,688,704 bytes free
    WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
    256 --- E O F --- 2009-02-14 18:53:30
This discussion has been closed.
Meet your Ambassadors

🚀 Getting Started

Hi new member!

Our Getting Started Guide will help you get the most out of the Forum

Categories

  • All Categories
  • 352.9K Banking & Borrowing
  • 253.9K Reduce Debt & Boost Income
  • 454.7K Spending & Discounts
  • 245.9K Work, Benefits & Business
  • 602K Mortgages, Homes & Bills
  • 177.8K Life & Family
  • 259.8K Travel & Transport
  • 1.5M Hobbies & Leisure
  • 16K Discuss & Feedback
  • 37.7K Read-Only Boards

Is this how you want to be seen?

We see you are using a default avatar. It takes only a few seconds to pick a picture.