SUPERAntiSpyware Scan Log Generated 06/15/2008 at 09:58 PM Application Version : 3.6.1000 Core Rules Database Version : 3482 Trace Rules Database Version: 1473 Scan type : Complete Scan Total Scan Time : 01:27:19 Memory items scanned : 489 Memory threats detected : 4 Registry items scanned : 5559 Registry threats detected : 36 File items scanned : 65203 File threats detected : 20 Adware.Adservs C:\WINDOWS\QMVHIE9SAXZPZXJP\ASAPPSRV.DLL C:\WINDOWS\QMVHIE9SAXZPZXJP\ASAPPSRV.DLL C:\WINDOWS\system32\atmtd.dll C:\WINDOWS\system32\atmtd.dll._ C:\DOCUMENTS AND SETTINGS\BEA OLIVIERI\APPLICATION DATA\MALWAREBYTES\MALWAREBYTES' ANTI-MALWARE\QUARANTINE\QUAR1.47650 C:\WINDOWS\SYSTEM32\3039A\DINACOMDE.EXE Unclassified.Unknown Origin C:\WINDOWS\QMVHIE9SAXZPZXJP\COMMAND.EXE C:\WINDOWS\QMVHIE9SAXZPZXJP\COMMAND.EXE HKLM\System\ControlSet001\Services\cmdService HKLM\System\ControlSet002\Services\cmdService HKLM\System\CurrentControlSet\Services\cmdService C:\DOCUMENTS AND SETTINGS\BEA OLIVIERI\APPLICATION DATA\MALWAREBYTES\MALWAREBYTES' ANTI-MALWARE\QUARANTINE\QUAR1.83490 Adware.ClickSpring/Resident C:\PROGRA~1\WNSXS~1\OOL32~1.EXE C:\PROGRA~1\WNSXS~1\OOL32~1.EXE Adware.ClickSpring-Variant C:\DOCUME~1\BEAOLI~1\MYDOCU~1\STEM32~1\WOWEXEC.EXE C:\DOCUME~1\BEAOLI~1\MYDOCU~1\STEM32~1\WOWEXEC.EXE C:\WINDOWS\Prefetch\WOWEXEC.EXE-1DC33AE7.pf Adware.ClickSpring [Aida] C:\DOCUME~1\BEAOLI~1\MYDOCU~1\STEM32~1\WOWEXEC.EXE C:\DOCUMENTS AND SETTINGS\BEA OLIVIERI\LOCAL SETTINGS\TEMP\!UPDATE.EXE C:\DOCUMENTS AND SETTINGS\BEA OLIVIERI\LOCAL SETTINGS\TEMP\NDR1F.TMP C:\DOCUMENTS AND SETTINGS\BEA OLIVIERI\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\L5M66YFU\!UPDATE-4495[1].0000 C:\DOCUMENTS AND SETTINGS\BEA OLIVIERI\MY DOCUMENTS\STEM32~1\WOWEXEC.EXE Adware.Tracking Cookie C:\Documents and Settings\Bea Olivieri\Cookies\bea_olivieri@2o7[1].txt C:\Documents and Settings\Bea Olivieri\Cookies\bea_olivieri@ad.outerinfoads[3].txt C:\Documents and Settings\Bea Olivieri\Cookies\bea_olivieri@ad.yieldmanager[2].txt C:\Documents and Settings\Bea Olivieri\Cookies\bea_olivieri@ad.outerinfoads[1].txt Trojan.NetMon/DNSChange HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000 HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc Trojan.cmdService HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Type HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Start HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ErrorControl HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ImagePath HKLM\SYSTEM\CurrentControlSet\Services\cmdService#DisplayName HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ObjectName HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security#Security HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#0 HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#Count HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#NextInstance HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000 HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000\Control HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000\Control#ActiveService Trojan.Unknown Origin C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP294\A0054013.VBS C:\WINDOWS\QMVHIE9SAXZPZXJP\KAP1KH6PURTDTRLD.VBS