I'm pretty hesitant to format at this point and start over, not because of the time involved, but because HTPCs are really tricky to "tweak" properly to get the playback as good as possible - especially with HDTV - and mine's working really well right now. I did run the Spy Sweeper, then ran it again (which found one more result) then ran it a third time (which came up clean) - all with reboots in between. I'll put the two logs that found something in this post and the newest HJT in the next.
In the hour or so I've browsed on this machine since running the multiple Spy Sweeper sweeps, I have yet to notice a problem, so that's good!
First Spy Sweeper Log:
Operation: File Access
Target:
Source: C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 6.0\AVP.EXE
5:09 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
5:09 PM: Shield States
5:09 PM: Spyware Definitions: 761
5:09 PM: Spy Sweeper 5.0.5.1286 started
3:50 PM: | End of Session, Thursday, September 14, 2006 |
3:48 PM: Your spyware definitions have been updated.
3:46 PM: IE Hijack Shield: Resetting IE advanced data value.
3:46 PM: IE Hijack Shield: Resetting Search Page value.
Operation: File Access
Target:
Source: C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 6.0\AVP.EXE
3:46 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
3:45 PM: Shield States
3:45 PM: Spyware Definitions: 691
3:45 PM: Spy Sweeper 5.0.5.1286 started
3:45 PM: Spy Sweeper 5.0.5.1286 started
3:45 PM: | Start of Session, Thursday, September 14, 2006 |
********
5:05 PM: Removal process completed. Elapsed time 00:00:19
5:05 PM: Quarantining All Traces: monstermarketplace cookie
5:05 PM: Quarantining All Traces: seeq cookie
5:05 PM: Quarantining All Traces: upspiral cookie
5:05 PM: Quarantining All Traces: stlyrics cookie
5:05 PM: Quarantining All Traces: redzip cookie
5:05 PM: Quarantining All Traces: burstbeacon cookie
5:05 PM: Quarantining All Traces: tacoda cookie
5:05 PM: Quarantining All Traces: statcounter cookie
5:05 PM: Quarantining All Traces: serving-sys cookie
5:05 PM: Quarantining All Traces: searchadnetwork cookie
5:05 PM: Quarantining All Traces: search123 cookie
5:05 PM: Quarantining All Traces: pricegrabber cookie
5:05 PM: Quarantining All Traces: partypoker cookie
5:05 PM: Quarantining All Traces: one-time-offer cookie
5:05 PM: Quarantining All Traces: nextag cookie
5:05 PM: Quarantining All Traces: realmedia cookie
5:05 PM: Quarantining All Traces: mygeek cookie
5:05 PM: Quarantining All Traces: maxserving cookie
5:05 PM: Quarantining All Traces: malwarewipe cookie
5:05 PM: Quarantining All Traces: webtrends cookie
5:05 PM: Quarantining All Traces: sex cookie
5:05 PM: Quarantining All Traces: trb.com cookie
5:05 PM: Quarantining All Traces: infospace cookie
5:05 PM: Quarantining All Traces: informit cookie
5:05 PM: Quarantining All Traces: imlive.com cookie
5:05 PM: Quarantining All Traces: ic-live cookie
5:05 PM: Quarantining All Traces: hypertracker.com cookie
5:05 PM: Quarantining All Traces: directtrack cookie
5:05 PM: Quarantining All Traces: danni cookie
5:05 PM: Quarantining All Traces: 360i cookie
5:05 PM: Quarantining All Traces: exitexchange cookie
5:05 PM: Quarantining All Traces: columbiahouse cookie
5:05 PM: Quarantining All Traces: ccbill cookie
5:05 PM: Quarantining All Traces: burstnet cookie
5:05 PM: Quarantining All Traces: bizrate cookie
5:05 PM: Quarantining All Traces: belnk cookie
5:05 PM: Quarantining All Traces: banner cookie
5:05 PM: Quarantining All Traces: a cookie
5:05 PM: Quarantining All Traces: atwola cookie
5:05 PM: Quarantining All Traces: ask cookie
5:05 PM: Quarantining All Traces: associated new media cookie
5:05 PM: Quarantining All Traces: adultfriendfinder cookie
5:05 PM: Quarantining All Traces: cd freaks cookie
5:05 PM: Quarantining All Traces: adrevolver cookie
5:05 PM: Quarantining All Traces: adknowledge cookie
5:05 PM: Quarantining All Traces: adecn cookie
5:05 PM: Quarantining All Traces: yieldmanager cookie
5:05 PM: Quarantining All Traces: about cookie
5:05 PM: Quarantining All Traces: go.com cookie
5:05 PM: Quarantining All Traces: websponsors cookie
5:05 PM: Quarantining All Traces: 3 cookie
5:05 PM: Quarantining All Traces: 80503492 cookie
5:05 PM: Quarantining All Traces: command
5:05 PM: Quarantining All Traces: spyware quake
5:05 PM: Quarantining All Traces: ezula ilookup
5:05 PM: Quarantining All Traces: targetsaver
5:05 PM: Quarantining All Traces: maxifiles
5:05 PM: Quarantining All Traces: elitemediagroup-mediamotor
5:05 PM: Quarantining All Traces: trafficsolution
5:05 PM: Quarantining All Traces: enbrowser
5:05 PM: Quarantining All Traces: trojan agent winlogonhook
5:05 PM: Removal process initiated
5:02 PM: Traces Found: 126
5:02 PM: Full Sweep has completed. Elapsed time 01:12:58
5:02 PM: HKLM\software\microsoft\windows\currentversion\uninstall\adrotator\ (ID = 1538545)
5:02 PM: File Sweep Complete, Elapsed Time: 01:10:54
4:59 PM: Warning: Failed to access drive J:
4:59 PM: Warning: Failed to access drive I:
4:59 PM: Warning: Failed to access drive H:
4:59 PM: Warning: Failed to access drive G:
4:58 PM: C:\WINDOWS\TWF0dCBQb3Bl\nqIXxF1kva15.vbs (ID = 185675)
4:50 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP156\A0028124.exe (ID = 329490)
4:50 PM: Found Adware: targetsaver
4:49 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP156\A0028117.vbs (ID = 231442)
4:49 PM: Found Adware: command
4:47 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP161\A0028369.exe (ID = 335877)
4:47 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP169\A0028545.exe (ID = 346389)
4:45 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP156\A0028208.exe (ID = 344945)
4:26 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP161\A0028371.exe (ID = 336857)
4:15 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0027823.exe (ID = 322316)
4:09 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0027826.dll (ID = 339832)
4:05 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0028055.exe (ID = 322316)
3:58 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0028038.exe (ID = 322316)
3:58 PM: Found Adware: maxifiles
3:52 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0027787.ini (ID = 298068)
3:52 PM: Found Adware: spyware quake
3:51 PM: Starting File Sweep
3:51 PM: Warning: Failed to access drive A:
3:51 PM: Cookie Sweep Complete, Elapsed Time: 00:00:07
3:51 PM: c:\documents and settings\localservice\cookies\system@monstermarketplace[1].txt (ID = 3006)
3:51 PM: Found Spy Cookie: monstermarketplace cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3332)
3:51 PM: Found Spy Cookie: seeq cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 3615)
3:51 PM: Found Spy Cookie: upspiral cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3462)
3:51 PM: Found Spy Cookie: stlyrics cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3312)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 3250)
3:51 PM: Found Spy Cookie: redzip cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2337)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2335)
3:51 PM: Found Spy Cookie: burstbeacon cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@trb[1].txt (ID = 3587)
3:51 PM: c:\documents and settings\matt\cookies\matt@tacoda[1].txt (ID = 6444)
3:51 PM: Found Spy Cookie: tacoda cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@statcounter[1].txt (ID = 3447)
3:51 PM: Found Spy Cookie: statcounter cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@serving-sys[1].txt (ID = 3343)
3:51 PM: Found Spy Cookie: serving-sys cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@searchadnetwork[2].txt (ID = 3311)
3:51 PM: Found Spy Cookie: searchadnetwork cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@search123[1].txt (ID = 3305)
3:51 PM: Found Spy Cookie: search123 cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@realmedia[1].txt (ID = 3235)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2528)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@pricegrabber[2].txt (ID = 3185)
3:51 PM: Found Spy Cookie: pricegrabber cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@partypoker[3].txt (ID = 3111)
3:51 PM: c:\documents and settings\matt\cookies\matt@partypoker[2].txt (ID = 3111)
3:51 PM: Found Spy Cookie: partypoker cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@one-time-offer[1].txt (ID = 3095)
3:51 PM: Found Spy Cookie: one-time-offer cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@nextag[1].txt (ID = 5014)
3:51 PM: Found Spy Cookie: nextag cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3236)
3:51 PM: Found Spy Cookie: realmedia cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\matt@mygeek[1].txt (ID = 3041)
3:51 PM: Found Spy Cookie: mygeek cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@maxserving[2].txt (ID = 2966)
3:51 PM: Found Spy Cookie: maxserving cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@malwarewipe[1].txt (ID = 6467)
3:51 PM: Found Spy Cookie: malwarewipe cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3669)
3:51 PM: Found Spy Cookie: webtrends cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2866)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3348)
3:51 PM: Found Spy Cookie: sex cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3588)
3:51 PM: Found Spy Cookie: trb.com cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@infospace[2].txt (ID = 2865)
3:51 PM: Found Spy Cookie: infospace cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@informit[1].txt (ID = 2863)
3:51 PM: Found Spy Cookie: informit cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@imlive[1].txt (ID = 2843)
3:51 PM: Found Spy Cookie: imlive.com cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@ic-live[1].txt (ID = 2821)
3:51 PM: Found Spy Cookie: ic-live cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@hypertracker[1].txt (ID = 2817)
3:51 PM: Found Spy Cookie: hypertracker.com cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@go[1].txt (ID = 2728)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@exitexchange[1].txt (ID = 2633)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2293)
3:51 PM: c:\documents and settings\matt\cookies\matt@directtrack[1].txt (ID = 2527)
3:51 PM: Found Spy Cookie: directtrack cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@danni[1].txt (ID = 2493)
3:51 PM: Found Spy Cookie: danni cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 1962)
3:51 PM: Found Spy Cookie: 360i cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2634)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2634)
3:51 PM: Found Spy Cookie: exitexchange cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@columbiahouse[2].txt (ID = 2443)
3:51 PM: Found Spy Cookie: columbiahouse cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2371)
3:51 PM: c:\documents and settings\matt\cookies\matt@cdfreaks[2].txt (ID = 2370)
3:51 PM: c:\documents and settings\matt\cookies\matt@ccbill[1].txt (ID = 2369)
3:51 PM: Found Spy Cookie: ccbill cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@burstnet[1].txt (ID = 2336)
3:51 PM: Found Spy Cookie: burstnet cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@bizrate[2].txt (ID = 2308)
3:51 PM: Found Spy Cookie: bizrate cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@belnk[1].txt (ID = 2292)
3:51 PM: Found Spy Cookie: belnk cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@banner[1].txt (ID = 2276)
3:51 PM: Found Spy Cookie: banner cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@a[1].txt (ID = 2027)
3:51 PM: Found Spy Cookie: a cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@atwola[1].txt (ID = 2255)
3:51 PM: Found Spy Cookie: atwola cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@ask[1].txt (ID = 2245)
3:51 PM: Found Spy Cookie: ask cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2223)
3:51 PM: Found Spy Cookie: associated new media cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\matt@adultfriendfinder[2].txt (ID = 2165)
3:51 PM: Found Spy Cookie: adultfriendfinder cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2371)
3:51 PM: Found Spy Cookie: cd freaks cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@adrevolver[2].txt (ID = 2088)
3:51 PM: Found Spy Cookie: adrevolver cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@adknowledge[1].txt (ID = 2072)
3:51 PM: Found Spy Cookie: adknowledge cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@adecn[1].txt (ID = 2063)
3:51 PM: Found Spy Cookie: adecn cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3751)
3:51 PM: Found Spy Cookie: yieldmanager cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@about[2].txt (ID = 2037)
3:51 PM: Found Spy Cookie: about cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: Found Spy Cookie: go.com cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 3665)
3:51 PM: Found Spy Cookie: websponsors cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 1960)
3:51 PM: Found Spy Cookie: 3 cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@80503492[1].txt (ID = 2013)
3:51 PM: Found Spy Cookie: 80503492 cookie
3:51 PM: Starting Cookie Sweep
3:51 PM: Registry Sweep Complete, Elapsed Time:00:00:13
3:51 PM: HKU\S-1-5-21-1614895754-1364589140-1801674531-1003\software\system\sysuid\ (ID = 731748)
3:51 PM: HKCR\clsid\{2cab0356-88e3-4902-a85d-379689c625e1}\inprocserver32\ (ID = 1626309)
3:51 PM: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objects\{746455fe-d059-47e7-af0e-140e03f5a447}\ (ID = 1586270)
3:51 PM: HKLM\software\classes\typelib\{fdb10602-aa12-4e76-aae2-2b328a3e950a}\ (ID = 1586223)
3:51 PM: HKLM\software\classes\crypt.core.1\ (ID = 1586219)
3:51 PM: HKLM\software\classes\crypt.core\ (ID = 1586213)
3:51 PM: HKLM\software\classes\clsid\{746455fe-d059-47e7-af0e-140e03f5a447}\ (ID = 1586201)
3:51 PM: HKLM\software\classes\clsid\{2cab0356-88e3-4902-a85d-379689c625e1}\ (ID = 1586189)
3:51 PM: HKCR\typelib\{fdb10602-aa12-4e76-aae2-2b328a3e950a}\ (ID = 1586179)
3:51 PM: HKCR\crypt.core.1\ (ID = 1586175)
3:51 PM: HKCR\crypt.core\ (ID = 1586169)
3:51 PM: HKCR\clsid\{746455fe-d059-47e7-af0e-140e03f5a447}\ (ID = 1586157)
3:51 PM: HKCR\clsid\{2cab0356-88e3-4902-a85d-379689c625e1}\ (ID = 1586145)
3:51 PM: HKCR\bannerrotator.rotator\ (ID = 1538546)
3:51 PM: HKLM\software\classes\interface\{7682c1a6-c500-4c78-93b9-5a76a91520f8}\ (ID = 1502055)
3:51 PM: HKLM\software\classes\interface\{597aa130-f00b-40b8-adaf-529d4da9be52}\ (ID = 1502046)
3:51 PM: HKCR\interface\{7682c1a6-c500-4c78-93b9-5a76a91520f8}\ (ID = 1497902)
3:51 PM: HKCR\interface\{597aa130-f00b-40b8-adaf-529d4da9be52}\ (ID = 1497893)
3:51 PM: Found Adware: elitemediagroup-mediamotor
3:51 PM: HKLM\software\classes\bannerrotator.rotator.1\ (ID = 1337124)
3:51 PM: HKLM\software\classes\bannerrotator.rotator\ (ID = 1337118)
3:51 PM: HKCR\bannerrotator.rotator.1\ (ID = 1337093)
3:51 PM: Found Adware: trafficsolution
3:51 PM: HKLM\software\classes\onone.theimp.1\ (ID = 1221523)
3:51 PM: HKLM\software\classes\onone.theimp\ (ID = 1221515)
3:51 PM: HKCR\onone.theimp.1\ (ID = 1221367)
3:51 PM: HKCR\onone.theimp\ (ID = 1221362)
3:51 PM: HKLM\software\microsoft\mssmgr\ (ID = 937101)
3:51 PM: Found Trojan Horse: trojan agent winlogonhook
3:51 PM: HKLM\software\system\sysold\ (ID = 926808)
3:51 PM: Found Adware: enbrowser
3:51 PM: Starting Registry Sweep
3:51 PM: Memory Sweep Complete, Elapsed Time: 00:01:23
3:50 PM: Starting Memory Sweep
3:50 PM: C:\WINDOWS\system32\nsh1D.dll (ID = 1625910)
3:50 PM: HKCR\clsid\{746455fe-d059-47e7-af0e-140e03f5a447}\inprocserver32\ (ID = 1625910)
3:50 PM: Found Adware: ezula ilookup
3:50 PM: Sweep initiated using definitions version 761
3:50 PM: Spy Sweeper 5.0.5.1286 started
3:50 PM: | Start of Session, Thursday, September 14, 2006 |
********
Second Spy Sweeper Log:
Operation: File Access
Target:
Source: C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 6.0\AVP.EXE
6:28 PM: Tamper Detection
6:28 PM: Warning: The handle is invalid
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
6:28 PM: Warning: The handle is invalid
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
6:28 PM: Shield States
6:28 PM: Spyware Definitions: 761
6:28 PM: Spy Sweeper 5.0.5.1286 started
Operation: File Access
Target:
Source: C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 6.0\AVP.EXE
5:09 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
5:09 PM: Shield States
5:09 PM: Spyware Definitions: 761
5:09 PM: Spy Sweeper 5.0.5.1286 started
3:50 PM: | End of Session, Thursday, September 14, 2006 |
3:48 PM: Your spyware definitions have been updated.
3:46 PM: IE Hijack Shield: Resetting IE advanced data value.
3:46 PM: IE Hijack Shield: Resetting Search Page value.
Operation: File Access
Target:
Source: C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 6.0\AVP.EXE
3:46 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
3:45 PM: Shield States
3:45 PM: Spyware Definitions: 691
3:45 PM: Spy Sweeper 5.0.5.1286 started
3:45 PM: Spy Sweeper 5.0.5.1286 started
3:45 PM: | Start of Session, Thursday, September 14, 2006 |
********
5:05 PM: Removal process completed. Elapsed time 00:00:19
5:05 PM: Quarantining All Traces: monstermarketplace cookie
5:05 PM: Quarantining All Traces: seeq cookie
5:05 PM: Quarantining All Traces: upspiral cookie
5:05 PM: Quarantining All Traces: stlyrics cookie
5:05 PM: Quarantining All Traces: redzip cookie
5:05 PM: Quarantining All Traces: burstbeacon cookie
5:05 PM: Quarantining All Traces: tacoda cookie
5:05 PM: Quarantining All Traces: statcounter cookie
5:05 PM: Quarantining All Traces: serving-sys cookie
5:05 PM: Quarantining All Traces: searchadnetwork cookie
5:05 PM: Quarantining All Traces: search123 cookie
5:05 PM: Quarantining All Traces: pricegrabber cookie
5:05 PM: Quarantining All Traces: partypoker cookie
5:05 PM: Quarantining All Traces: one-time-offer cookie
5:05 PM: Quarantining All Traces: nextag cookie
5:05 PM: Quarantining All Traces: realmedia cookie
5:05 PM: Quarantining All Traces: mygeek cookie
5:05 PM: Quarantining All Traces: maxserving cookie
5:05 PM: Quarantining All Traces: malwarewipe cookie
5:05 PM: Quarantining All Traces: webtrends cookie
5:05 PM: Quarantining All Traces: sex cookie
5:05 PM: Quarantining All Traces: trb.com cookie
5:05 PM: Quarantining All Traces: infospace cookie
5:05 PM: Quarantining All Traces: informit cookie
5:05 PM: Quarantining All Traces: imlive.com cookie
5:05 PM: Quarantining All Traces: ic-live cookie
5:05 PM: Quarantining All Traces: hypertracker.com cookie
5:05 PM: Quarantining All Traces: directtrack cookie
5:05 PM: Quarantining All Traces: danni cookie
5:05 PM: Quarantining All Traces: 360i cookie
5:05 PM: Quarantining All Traces: exitexchange cookie
5:05 PM: Quarantining All Traces: columbiahouse cookie
5:05 PM: Quarantining All Traces: ccbill cookie
5:05 PM: Quarantining All Traces: burstnet cookie
5:05 PM: Quarantining All Traces: bizrate cookie
5:05 PM: Quarantining All Traces: belnk cookie
5:05 PM: Quarantining All Traces: banner cookie
5:05 PM: Quarantining All Traces: a cookie
5:05 PM: Quarantining All Traces: atwola cookie
5:05 PM: Quarantining All Traces: ask cookie
5:05 PM: Quarantining All Traces: associated new media cookie
5:05 PM: Quarantining All Traces: adultfriendfinder cookie
5:05 PM: Quarantining All Traces: cd freaks cookie
5:05 PM: Quarantining All Traces: adrevolver cookie
5:05 PM: Quarantining All Traces: adknowledge cookie
5:05 PM: Quarantining All Traces: adecn cookie
5:05 PM: Quarantining All Traces: yieldmanager cookie
5:05 PM: Quarantining All Traces: about cookie
5:05 PM: Quarantining All Traces: go.com cookie
5:05 PM: Quarantining All Traces: websponsors cookie
5:05 PM: Quarantining All Traces: 3 cookie
5:05 PM: Quarantining All Traces: 80503492 cookie
5:05 PM: Quarantining All Traces: command
5:05 PM: Quarantining All Traces: spyware quake
5:05 PM: Quarantining All Traces: ezula ilookup
5:05 PM: Quarantining All Traces: targetsaver
5:05 PM: Quarantining All Traces: maxifiles
5:05 PM: Quarantining All Traces: elitemediagroup-mediamotor
5:05 PM: Quarantining All Traces: trafficsolution
5:05 PM: Quarantining All Traces: enbrowser
5:05 PM: Quarantining All Traces: trojan agent winlogonhook
5:05 PM: Removal process initiated
5:02 PM: Traces Found: 126
5:02 PM: Full Sweep has completed. Elapsed time 01:12:58
5:02 PM: HKLM\software\microsoft\windows\currentversion\uninstall\adrotator\ (ID = 1538545)
5:02 PM: File Sweep Complete, Elapsed Time: 01:10:54
4:59 PM: Warning: Failed to access drive J:
4:59 PM: Warning: Failed to access drive I:
4:59 PM: Warning: Failed to access drive H:
4:59 PM: Warning: Failed to access drive G:
4:58 PM: C:\WINDOWS\TWF0dCBQb3Bl\nqIXxF1kva15.vbs (ID = 185675)
4:50 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP156\A0028124.exe (ID = 329490)
4:50 PM: Found Adware: targetsaver
4:49 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP156\A0028117.vbs (ID = 231442)
4:49 PM: Found Adware: command
4:47 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP161\A0028369.exe (ID = 335877)
4:47 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP169\A0028545.exe (ID = 346389)
4:45 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP156\A0028208.exe (ID = 344945)
4:26 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP161\A0028371.exe (ID = 336857)
4:15 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0027823.exe (ID = 322316)
4:09 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0027826.dll (ID = 339832)
4:05 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0028055.exe (ID = 322316)
3:58 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0028038.exe (ID = 322316)
3:58 PM: Found Adware: maxifiles
3:52 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP155\A0027787.ini (ID = 298068)
3:52 PM: Found Adware: spyware quake
3:51 PM: Starting File Sweep
3:51 PM: Warning: Failed to access drive A:
3:51 PM: Cookie Sweep Complete, Elapsed Time: 00:00:07
3:51 PM: c:\documents and settings\localservice\cookies\system@monstermarketplace[1].txt (ID = 3006)
3:51 PM: Found Spy Cookie: monstermarketplace cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3332)
3:51 PM: Found Spy Cookie: seeq cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 3615)
3:51 PM: Found Spy Cookie: upspiral cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3462)
3:51 PM: Found Spy Cookie: stlyrics cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3312)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 3250)
3:51 PM: Found Spy Cookie: redzip cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2337)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2335)
3:51 PM: Found Spy Cookie: burstbeacon cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@trb[1].txt (ID = 3587)
3:51 PM: c:\documents and settings\matt\cookies\matt@tacoda[1].txt (ID = 6444)
3:51 PM: Found Spy Cookie: tacoda cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@statcounter[1].txt (ID = 3447)
3:51 PM: Found Spy Cookie: statcounter cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@serving-sys[1].txt (ID = 3343)
3:51 PM: Found Spy Cookie: serving-sys cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@searchadnetwork[2].txt (ID = 3311)
3:51 PM: Found Spy Cookie: searchadnetwork cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@search123[1].txt (ID = 3305)
3:51 PM: Found Spy Cookie: search123 cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@realmedia[1].txt (ID = 3235)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2528)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@pricegrabber[2].txt (ID = 3185)
3:51 PM: Found Spy Cookie: pricegrabber cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@partypoker[3].txt (ID = 3111)
3:51 PM: c:\documents and settings\matt\cookies\matt@partypoker[2].txt (ID = 3111)
3:51 PM: Found Spy Cookie: partypoker cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@one-time-offer[1].txt (ID = 3095)
3:51 PM: Found Spy Cookie: one-time-offer cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@nextag[1].txt (ID = 5014)
3:51 PM: Found Spy Cookie: nextag cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3236)
3:51 PM: Found Spy Cookie: realmedia cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\matt@mygeek[1].txt (ID = 3041)
3:51 PM: Found Spy Cookie: mygeek cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@maxserving[2].txt (ID = 2966)
3:51 PM: Found Spy Cookie: maxserving cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@malwarewipe[1].txt (ID = 6467)
3:51 PM: Found Spy Cookie: malwarewipe cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3669)
3:51 PM: Found Spy Cookie: webtrends cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2866)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3348)
3:51 PM: Found Spy Cookie: sex cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3588)
3:51 PM: Found Spy Cookie: trb.com cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@infospace[2].txt (ID = 2865)
3:51 PM: Found Spy Cookie: infospace cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@informit[1].txt (ID = 2863)
3:51 PM: Found Spy Cookie: informit cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@imlive[1].txt (ID = 2843)
3:51 PM: Found Spy Cookie: imlive.com cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@ic-live[1].txt (ID = 2821)
3:51 PM: Found Spy Cookie: ic-live cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@hypertracker[1].txt (ID = 2817)
3:51 PM: Found Spy Cookie: hypertracker.com cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@go[1].txt (ID = 2728)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@exitexchange[1].txt (ID = 2633)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2293)
3:51 PM: c:\documents and settings\matt\cookies\matt@directtrack[1].txt (ID = 2527)
3:51 PM: Found Spy Cookie: directtrack cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@danni[1].txt (ID = 2493)
3:51 PM: Found Spy Cookie: danni cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 1962)
3:51 PM: Found Spy Cookie: 360i cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2634)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2634)
3:51 PM: Found Spy Cookie: exitexchange cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@columbiahouse[2].txt (ID = 2443)
3:51 PM: Found Spy Cookie: columbiahouse cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2371)
3:51 PM: c:\documents and settings\matt\cookies\matt@cdfreaks[2].txt (ID = 2370)
3:51 PM: c:\documents and settings\matt\cookies\matt@ccbill[1].txt (ID = 2369)
3:51 PM: Found Spy Cookie: ccbill cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@burstnet[1].txt (ID = 2336)
3:51 PM: Found Spy Cookie: burstnet cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\matt@bizrate[2].txt (ID = 2308)
3:51 PM: Found Spy Cookie: bizrate cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@belnk[1].txt (ID = 2292)
3:51 PM: Found Spy Cookie: belnk cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@banner[1].txt (ID = 2276)
3:51 PM: Found Spy Cookie: banner cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@a[1].txt (ID = 2027)
3:51 PM: Found Spy Cookie: a cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@atwola[1].txt (ID = 2255)
3:51 PM: Found Spy Cookie: atwola cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@ask[1].txt (ID = 2245)
3:51 PM: Found Spy Cookie: ask cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2223)
3:51 PM: Found Spy Cookie: associated new media cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 2038)
3:51 PM: c:\documents and settings\matt\cookies\matt@adultfriendfinder[2].txt (ID = 2165)
3:51 PM: Found Spy Cookie: adultfriendfinder cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2371)
3:51 PM: Found Spy Cookie: cd freaks cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@adrevolver[2].txt (ID = 2088)
3:51 PM: Found Spy Cookie: adrevolver cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@adknowledge[1].txt (ID = 2072)
3:51 PM: Found Spy Cookie: adknowledge cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@adecn[1].txt (ID = 2063)
3:51 PM: Found Spy Cookie: adecn cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][1].txt (ID = 3751)
3:51 PM: Found Spy Cookie: yieldmanager cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@about[2].txt (ID = 2037)
3:51 PM: Found Spy Cookie: about cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 2729)
3:51 PM: Found Spy Cookie: go.com cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 3665)
3:51 PM: Found Spy Cookie: websponsors cookie
3:51 PM: c:\documents and settings\matt\cookies\
[email protected][2].txt (ID = 1960)
3:51 PM: Found Spy Cookie: 3 cookie
3:51 PM: c:\documents and settings\matt\cookies\matt@80503492[1].txt (ID = 2013)
3:51 PM: Found Spy Cookie: 80503492 cookie
3:51 PM: Starting Cookie Sweep
3:51 PM: Registry Sweep Complete, Elapsed Time:00:00:13
3:51 PM: HKU\S-1-5-21-1614895754-1364589140-1801674531-1003\software\system\sysuid\ (ID = 731748)
3:51 PM: HKCR\clsid\{2cab0356-88e3-4902-a85d-379689c625e1}\inprocserver32\ (ID = 1626309)
3:51 PM: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objects\{746455fe-d059-47e7-af0e-140e03f5a447}\ (ID = 1586270)
3:51 PM: HKLM\software\classes\typelib\{fdb10602-aa12-4e76-aae2-2b328a3e950a}\ (ID = 1586223)
3:51 PM: HKLM\software\classes\crypt.core.1\ (ID = 1586219)
3:51 PM: HKLM\software\classes\crypt.core\ (ID = 1586213)
3:51 PM: HKLM\software\classes\clsid\{746455fe-d059-47e7-af0e-140e03f5a447}\ (ID = 1586201)
3:51 PM: HKLM\software\classes\clsid\{2cab0356-88e3-4902-a85d-379689c625e1}\ (ID = 1586189)
3:51 PM: HKCR\typelib\{fdb10602-aa12-4e76-aae2-2b328a3e950a}\ (ID = 1586179)
3:51 PM: HKCR\crypt.core.1\ (ID = 1586175)
3:51 PM: HKCR\crypt.core\ (ID = 1586169)
3:51 PM: HKCR\clsid\{746455fe-d059-47e7-af0e-140e03f5a447}\ (ID = 1586157)
3:51 PM: HKCR\clsid\{2cab0356-88e3-4902-a85d-379689c625e1}\ (ID = 1586145)
3:51 PM: HKCR\bannerrotator.rotator\ (ID = 1538546)
3:51 PM: HKLM\software\classes\interface\{7682c1a6-c500-4c78-93b9-5a76a91520f8}\ (ID = 1502055)
3:51 PM: HKLM\software\classes\interface\{597aa130-f00b-40b8-adaf-529d4da9be52}\ (ID = 1502046)
3:51 PM: HKCR\interface\{7682c1a6-c500-4c78-93b9-5a76a91520f8}\ (ID = 1497902)
3:51 PM: HKCR\interface\{597aa130-f00b-40b8-adaf-529d4da9be52}\ (ID = 1497893)
3:51 PM: Found Adware: elitemediagroup-mediamotor
3:51 PM: HKLM\software\classes\bannerrotator.rotator.1\ (ID = 1337124)
3:51 PM: HKLM\software\classes\bannerrotator.rotator\ (ID = 1337118)
3:51 PM: HKCR\bannerrotator.rotator.1\ (ID = 1337093)
3:51 PM: Found Adware: trafficsolution
3:51 PM: HKLM\software\classes\onone.theimp.1\ (ID = 1221523)
3:51 PM: HKLM\software\classes\onone.theimp\ (ID = 1221515)
3:51 PM: HKCR\onone.theimp.1\ (ID = 1221367)
3:51 PM: HKCR\onone.theimp\ (ID = 1221362)
3:51 PM: HKLM\software\microsoft\mssmgr\ (ID = 937101)
3:51 PM: Found Trojan Horse: trojan agent winlogonhook
3:51 PM: HKLM\software\system\sysold\ (ID = 926808)
3:51 PM: Found Adware: enbrowser
3:51 PM: Starting Registry Sweep
3:51 PM: Memory Sweep Complete, Elapsed Time: 00:01:23
3:50 PM: Starting Memory Sweep
3:50 PM: C:\WINDOWS\system32\nsh1D.dll (ID = 1625910)
3:50 PM: HKCR\clsid\{746455fe-d059-47e7-af0e-140e03f5a447}\inprocserver32\ (ID = 1625910)
3:50 PM: Found Adware: ezula ilookup
3:50 PM: Sweep initiated using definitions version 761
3:50 PM: Spy Sweeper 5.0.5.1286 started
3:50 PM: | Start of Session, Thursday, September 14, 2006 |
********
6:25 PM: Removal process completed. Elapsed time 00:00:02
6:25 PM: Quarantining All Traces: command
6:25 PM: Removal process initiated
6:18 PM: Traces Found: 1
6:18 PM: Full Sweep has completed. Elapsed time 01:07:18
6:18 PM: File Sweep Complete, Elapsed Time: 01:05:25
6:16 PM: Warning: Failed to access drive J:
6:16 PM: Warning: Failed to access drive I:
6:16 PM: Warning: Failed to access drive H:
6:16 PM: Warning: Failed to access drive G:
6:14 PM: C:\System Volume Information\_restore{c3c9beb6-afeb-4296-83ae-9a641b4edbed}\RP197\A0030324.vbs (ID = 185675)
6:14 PM: Found Adware: command
5:13 PM: Starting File Sweep
5:13 PM: Warning: Failed to access drive A:
5:13 PM: Cookie Sweep Complete, Elapsed Time: 00:00:06
5:12 PM: Starting Cookie Sweep
5:12 PM: Registry Sweep Complete, Elapsed Time:00:00:13
5:12 PM: Starting Registry Sweep
5:12 PM: Memory Sweep Complete, Elapsed Time: 00:01:20
5:11 PM: Starting Memory Sweep
5:11 PM: Sweep initiated using definitions version 761
5:11 PM: Spy Sweeper 5.0.5.1286 started
5:11 PM: | Start of Session, Thursday, September 14, 2006 |
********