Geplaatst door Pieter Arntz
Download Hijackthis en klik op Config > Misc tools > generate Startuplog
Plaats het gemaakte log in je volgende post.
Groetjes,
Pieter
He,
dank je dat je reageerde.
hier is het log.
StartupList report, 22-1-2003, 15:10:45
StartupList version: 1.51
Started from : C:\Documents and Settings\Gebruiker\Local Settings\Temp\HijackThis.EXE
Detected: Windows XP SP1 (WinNT 5.01.2600)
Detected: Internet Explorer v6.00 SP1 (6.00.2800.1106)
* Using default options
==================================================
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Mixer.exe
C:\Program Files\TrojanHunter 2.5\TH_Guard.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\twain_32\A4CIS\WATCH.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal\avpcc.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal\avpcc.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal\avpm.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ntvdm.exe
\THOMAS\WINZIP\winzip32.exe
C:\Documents and Settings\Gebruiker\Local Settings\Temp\HijackThis.exe
--------------------------------------------------
Listing of startup folders:
Shell folders Startup:
[C:\Documents and Settings\Gebruiker\Menu Start\Programma's\Opstarten]
Watch.lnk = C:\WINDOWS\twain_32\A4CIS\WATCH.exe
Shell folders Common Startup:
[C:\Documents and Settings\All Users\Menu Start\Programma's\Opstarten]
Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
--------------------------------------------------
Checking Windows NT UserInit:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
UserInit = C:\WINDOWS\system32\userinit.exe,
--------------------------------------------------
Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
C-Media Mixer = Mixer.exe /startup
NeroCheck = C:\WINDOWS\System32\NeroCheck.exe
WinampAgent = "C:\Program Files\Winamp\Winampa.exe"
THGuard = "C:\Program Files\TrojanHunter 2.5\TH_Guard.exe"
AVPCC = "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal\avpcc.exe" /wait
Anti-Virus&Trojan = C:\programfiles\antivirus\Anti-Virus&Trojan.exe
--------------------------------------------------
Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
CTFMON.EXE = C:\WINDOWS\System32\ctfmon.exe
MSMSGS = "C:\Program Files\Messenger\msmsgs.exe" /background
--------------------------------------------------
Enumerating Browser Helper Objects:
(no name) - c:\program files\acrobat\Reader\ActiveX\AcroIEHelper.ocx - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
--------------------------------------------------
Enumerating Download Program Files:
[HouseCall Besturing]
InProcServer32 = C:\WINDOWS\DOWNLO~1\xscan53.ocx
CODEBASE =
http://a840.g.akamai.net/7/840/537/2003011601/housecall.antivirus.com/housecall/xscan53.cab
[InstallShield International Setup Player]
InProcServer32 = c:\windows\downlo~1\isetup.dll
CODEBASE =
http://www.installengine.com/engine/isetup.cab
[PBGNX Control]
InProcServer32 = C:\WINDOWS\DOWNLO~1\PBGNX.ocx
CODEBASE =
https://www.p3.postbank.nl/GTO/PBGNX.cab
--------------------------------------------------
End of report, 3.976 bytes
Report generated in 0,140 seconds
Command line options:
/verbose - to add additional info on each section
/complete - to include empty sections and unsuspicious data
/full - to include several rarely-important sections
/force9x - to include Win9x-only startups even if running on WinNT
/forcent - to include WinNT-only startups even if running on Win9x
/forceall - to include all Win9x and WinNT startups, regardless of platform
/history - to list version history only