12:44 AM: Removal process completed. Elapsed time 00:02:01
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E2.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E2.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E3.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E3.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E3.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E4.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E4.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST2E4.tmp". Reason: The system cannot find the file specified
12:44 AM: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
12:44 AM: Quarantining All Traces: zedo cookie
12:44 AM: Quarantining All Traces: realtracker cookie
12:44 AM: Quarantining All Traces: trafficmp cookie
12:44 AM: Quarantining All Traces: webtrendslive cookie
12:44 AM: Quarantining All Traces: server.iad.liveperson cookie
12:44 AM: Quarantining All Traces: ecomplanet cookie
12:44 AM: Quarantining All Traces: overture cookie
12:44 AM: Quarantining All Traces: casalemedia cookie
12:44 AM: Quarantining All Traces: azjmp cookie
12:44 AM: Quarantining All Traces: atlas dmt cookie
12:44 AM: Quarantining All Traces: ask cookie
12:44 AM: Quarantining All Traces: tacoda cookie
12:44 AM: Quarantining All Traces: advertising cookie
12:44 AM: Quarantining All Traces: go.com cookie
12:44 AM: Quarantining All Traces: 2o7.net cookie
12:44 AM: Quarantining All Traces: tribalfusion cookie
12:44 AM: Quarantining All Traces: mediaplex cookie
12:44 AM: Quarantining All Traces: pointroll cookie
12:44 AM: Quarantining All Traces: yieldmanager cookie
12:44 AM: Quarantining All Traces: hi5 toolbar
12:44 AM: Quarantining All Traces: coolsavings
12:43 AM: Quarantining All Traces: linkmaker
12:43 AM: Quarantining All Traces: targetsaver
12:43 AM: Quarantining All Traces: maxifiles
12:43 AM: Quarantining All Traces: purityscan
12:43 AM: Quarantining All Traces: trojan-downloader-nurech
12:43 AM: Quarantining All Traces: trojan-backdoor-progdav
12:43 AM: Quarantining All Traces: virtumonde
12:42 AM: Removal process initiated
12:41 AM: Traces Found: 68
12:41 AM: Full Sweep has completed. Elapsed time 01:18:11
12:41 AM: File Sweep Complete, Elapsed Time: 01:02:47
12:33 AM: Warning: Failed to access drive E:
12:33 AM: Warning: Failed to access drive D:
12:17 AM: C:\Program Files\Yahoo!\YPSR\Quarantine\ppq5F7.tmp (ID = 193496)
12:17 AM: C:\WINDOWS\system32\yrwmhje.aka (ID = 276229)
12:17 AM: Found Adware: linkmaker
12:16 AM: Access to Hosts file blocked for C:\PROGRAM FILES\GRISOFT\AVG ANTI-SPYWARE 7.5\AVGAS.EXE
12:07 AM: C:\RECYCLER\S-1-5-21-1177238915-507921405-1708537768-500\Dc2\iqmwd\class-barrel (ID = 78229)
12:01 AM: C:\Program Files\Yahoo!\YPSR\Quarantine\ppq5F8.tmp (ID = 193501)
11:56 PM: C:\Program Files\Yahoo!\YPSR\Quarantine\ppq337.tmp\Squiggly.CGD (ID = 53868)
11:51 PM: C:\Program Files\Yahoo!\YPSR\Quarantine\ppq337.tmp\Piggy.CGD (ID = 53867)
11:49 PM: C:\Program Files\Yahoo!\YPSR\Quarantine\ppq4F1.tmp (ID = 330712)
11:42 PM: C:\QooBox\Purity\Program Files\Common Files\SMANTE~1\chkntfs.exe (ID = 447)
11:42 PM: Found Adware: purityscan
11:39 PM: C:\WINDOWS\system32\wsnpoem (4 subtraces) (ID = 2147533502)
11:38 PM: Starting File Sweep
11:38 PM: Warning: Failed to access drive A:
11:38 PM: Cookie Sweep Complete, Elapsed Time: 00:00:06
11:38 PM: c:\documents and settings\odirish\cookies\odirish@zedo[1].txt (ID = 3762)
11:38 PM: Found Spy Cookie: zedo cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3242)
11:38 PM: Found Spy Cookie: realtracker cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@tribalfusion[2].txt (ID = 3589)
11:38 PM: c:\documents and settings\odirish\cookies\odirish@trafficmp[2].txt (ID = 3581)
11:38 PM: Found Spy Cookie: trafficmp cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@tacoda[1].txt (ID = 6444)
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3667)
11:38 PM: Found Spy Cookie: webtrendslive cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][2].txt (ID = 3341)
11:38 PM: Found Spy Cookie: server.iad.liveperson cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 2729)
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3106)
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 1958)
11:38 PM: c:\documents and settings\odirish\cookies\odirish@mediaplex[1].txt (ID = 6442)
11:38 PM: c:\documents and settings\odirish\cookies\odirish@go[1].txt (ID = 2728)
11:38 PM: c:\documents and settings\odirish\cookies\odirish@ecomplanet[1].txt (ID = 2577)
11:38 PM: Found Spy Cookie: ecomplanet cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3106)
11:38 PM: Found Spy Cookie: overture cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 1958)
11:38 PM: c:\documents and settings\odirish\cookies\odirish@casalemedia[1].txt (ID = 2354)
11:38 PM: Found Spy Cookie: casalemedia cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@azjmp[1].txt (ID = 2270)
11:38 PM: Found Spy Cookie: azjmp cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@atdmt[2].txt (ID = 2253)
11:38 PM: Found Spy Cookie: atlas dmt cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@ask[1].txt (ID = 2245)
11:38 PM: Found Spy Cookie: ask cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][2].txt (ID = 6445)
11:38 PM: Found Spy Cookie: tacoda cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@advertising[1].txt (ID = 2175)
11:38 PM: Found Spy Cookie: advertising cookie
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3148)
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][2].txt (ID = 3751)
11:38 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 2729)
11:38 PM: Found Spy Cookie: go.com cookie
11:38 PM: c:\documents and settings\odirish\cookies\odirish@2o7[2].txt (ID = 1957)
11:38 PM: Found Spy Cookie: 2o7.net cookie
11:38 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@tribalfusion[1].txt (ID = 3589)
11:38 PM: Found Spy Cookie: tribalfusion cookie
11:38 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@mediaplex[1].txt (ID = 6442)
11:38 PM: Found Spy Cookie: mediaplex cookie
11:38 PM: c:\documents and settings\fr1dg3\cookies\
[email protected][1].txt (ID = 3148)
11:38 PM: Found Spy Cookie: pointroll cookie
11:38 PM: c:\documents and settings\fr1dg3\cookies\
[email protected][2].txt (ID = 3751)
11:38 PM: Found Spy Cookie: yieldmanager cookie
11:38 PM: Starting Cookie Sweep
11:38 PM: Registry Sweep Complete, Elapsed Time:00:01:51
11:38 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
11:38 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
11:38 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
11:38 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
11:38 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\unker\ (ID = 1630527)
11:38 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\ipwins\ (ID = 1516546)
11:38 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\idl\ (ID = 1351285)
11:38 PM: Found Adware: targetsaver
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1008\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1008\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1008\software\unker\ (ID = 1630527)
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1010\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1010\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1010\software\unker\ (ID = 1630527)
11:37 PM: Found Trojan Horse: trojan-downloader-nurech
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-500\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
11:37 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-500\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
11:37 PM: Found Trojan Horse: trojan-backdoor-progdav
11:37 PM: HKLM\system\currentcontrolset\services\com+ messages\ (ID = 1895892)
11:37 PM: HKLM\system\controlset002\services\com+ messages\ (ID = 1895883)
11:37 PM: HKLM\system\controlset002\enum\root\legacy_com+_messages\ (ID = 1895874)
11:37 PM: HKLM\system\controlset001\services\com+ messages\ (ID = 1895861)
11:37 PM: HKLM\system\controlset001\enum\root\legacy_com+_messages\ (ID = 1895850)
11:37 PM: HKLM\software\microsoft\windows\currentversion\uninstall\ipwins\ (ID = 1516581)
11:37 PM: Found Adware: maxifiles
11:36 PM: HKCR\toolbar.toolbarobj.1\ (ID = 127132)
11:36 PM: HKCR\toolbar.toolbarobj\ (ID = 127131)
11:36 PM: Found Adware: hi5 toolbar
11:36 PM: HKLM\software\classes\clsid\{11bdb904-c0bc-41ce-910b-0d12fd619fd0}\ (ID = 107005)
11:36 PM: HKCR\clsid\{11bdb904-c0bc-41ce-910b-0d12fd619fd0}\ (ID = 106999)
11:36 PM: Found Adware: coolsavings
11:36 PM: Starting Registry Sweep
11:36 PM: Memory Sweep Complete, Elapsed Time: 00:12:55
11:23 PM: Starting Memory Sweep
11:23 PM: HKLM\system\currentcontrolset\services\com+ messages\ || imagepath (ID = 1910991)
11:23 PM: Found Adware: virtumonde
11:23 PM: Start Full Sweep
11:23 PM: Sweep initiated using definitions version 842
11:23 PM: Spy Sweeper 5.2.3.2138 started
11:23 PM: | Start of Session, Sunday, January 21, 2007 |
********
11:23 PM: | End of Session, Sunday, January 21, 2007 |
11:16 PM: Access to Hosts file blocked for C:\PROGRAM FILES\GRISOFT\AVG ANTI-SPYWARE 7.5\AVGAS.EXE
Keylogger: Off
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites: Off
Hosts File Shield: On
Internet Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
11:11 PM: Shield States
11:11 PM: Spyware Definitions: 842
11:08 PM: Spy Sweeper 5.2.3.2138 started
1:08 PM: | End of Session, Sunday, January 21, 2007 |
Keylogger: Off
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites: Off
Hosts File Shield: On
Internet Communication Shield: On
1:04 PM: Messenger service has been disabled.
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
1:04 PM: Shield States
1:04 PM: Spyware Definitions: 842
1:04 PM: Warning: Virus definitions files are invalid, please update your virus definitions. 220
1:03 PM: Spy Sweeper 5.2.3.2138 started
1:01 PM: Spy Sweeper 5.2.3.2138 started
1:01 PM: Spy Sweeper 5.2.3.2138 started
1:01 PM: | Start of Session, Sunday, January 21, 2007 |
********
1:31 PM: Sweep Status: 29 Items Found
1:31 PM: Traces Found: 69
1:31 PM: File Sweep Complete, Elapsed Time: 00:11:27
1:31 PM: Sweep Canceled
1:30 PM: C:\Program Files\Yahoo!\YPSR\Quarantine\ppq4F1.tmp (ID = 330712)
1:23 PM: C:\QooBox\Purity\Program Files\Common Files\SMANTE~1\chkntfs.exe (ID = 447)
1:23 PM: Found Adware: purityscan
1:20 PM: C:\WINDOWS\system32\wsnpoem (4 subtraces) (ID = 2147533502)
1:19 PM: Starting File Sweep
1:19 PM: Warning: Failed to access drive A:
1:19 PM: Cookie Sweep Complete, Elapsed Time: 00:00:09
1:19 PM: c:\documents and settings\odirish\cookies\odirish@zedo[1].txt (ID = 3762)
1:19 PM: Found Spy Cookie: zedo cookie
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3242)
1:19 PM: Found Spy Cookie: realtracker cookie
1:19 PM: c:\documents and settings\odirish\cookies\odirish@tribalfusion[2].txt (ID = 3589)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@trafficmp[2].txt (ID = 3581)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@tacoda[1].txt (ID = 6444)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3667)
1:19 PM: Found Spy Cookie: webtrendslive cookie
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][2].txt (ID = 3341)
1:19 PM: Found Spy Cookie: server.iad.liveperson cookie
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 2729)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3106)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 1958)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@mediaplex[1].txt (ID = 6442)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@go[1].txt (ID = 2728)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@ecomplanet[1].txt (ID = 2577)
1:19 PM: Found Spy Cookie: ecomplanet cookie
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3106)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 1958)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@casalemedia[1].txt (ID = 2354)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@azjmp[1].txt (ID = 2270)
1:19 PM: Found Spy Cookie: azjmp cookie
1:19 PM: c:\documents and settings\odirish\cookies\odirish@atdmt[2].txt (ID = 2253)
1:19 PM: c:\documents and settings\odirish\cookies\odirish@ask[1].txt (ID = 2245)
1:19 PM: Found Spy Cookie: ask cookie
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][2].txt (ID = 6445)
1:19 PM: Found Spy Cookie: tacoda cookie
1:19 PM: c:\documents and settings\odirish\cookies\odirish@advertising[1].txt (ID = 2175)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 3148)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][2].txt (ID = 3751)
1:19 PM: c:\documents and settings\odirish\cookies\
[email protected][1].txt (ID = 2729)
1:19 PM: Found Spy Cookie: go.com cookie
1:19 PM: c:\documents and settings\odirish\cookies\odirish@2o7[2].txt (ID = 1957)
1:19 PM: Found Spy Cookie: 2o7.net cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@tribalfusion[1].txt (ID = 3589)
1:19 PM: Found Spy Cookie: tribalfusion cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@trafficmp[2].txt (ID = 3581)
1:19 PM: Found Spy Cookie: trafficmp cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@realmedia[1].txt (ID = 3235)
1:19 PM: Found Spy Cookie: realmedia cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@overture[1].txt (ID = 3105)
1:19 PM: Found Spy Cookie: overture cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@mediaplex[1].txt (ID = 6442)
1:19 PM: Found Spy Cookie: mediaplex cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@casalemedia[1].txt (ID = 2354)
1:19 PM: Found Spy Cookie: casalemedia cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@atdmt[2].txt (ID = 2253)
1:19 PM: Found Spy Cookie: atlas dmt cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@advertising[2].txt (ID = 2175)
1:19 PM: Found Spy Cookie: advertising cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\fr1dg3@adserver[1].txt (ID = 2141)
1:19 PM: Found Spy Cookie: adserver cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\
[email protected][2].txt (ID = 3148)
1:19 PM: Found Spy Cookie: pointroll cookie
1:19 PM: c:\documents and settings\fr1dg3\cookies\
[email protected][2].txt (ID = 3751)
1:19 PM: Found Spy Cookie: yieldmanager cookie
1:19 PM: Starting Cookie Sweep
1:19 PM: Registry Sweep Complete, Elapsed Time:00:01:31
1:19 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
1:19 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
1:19 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
1:19 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
1:19 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\unker\ (ID = 1630527)
1:19 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\ipwins\ (ID = 1516546)
1:19 PM: HKU\S-1-5-21-1177238915-507921405-1708537768-1003\software\idl\ (ID = 1351285)
1:19 PM: Found Adware: targetsaver
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1008\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1008\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1008\software\unker\ (ID = 1630527)
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1010\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1010\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-1010\software\unker\ (ID = 1630527)
1:19 PM: Found Trojan Horse: trojan-downloader-nurech
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-500\software\microsoft\windows\currentversion\explorer\ || {f710fa10-2031-3106-8872-93a2b5c5c620} (ID = 1858203)
1:19 PM: HKU\WRSS_Profile_S-1-5-21-1177238915-507921405-1708537768-500\software\microsoft\windows\currentversion\explorer\ || {6780a29e-6a18-0c70-1dff-1610dde00108} (ID = 1858202)
1:19 PM: Found Trojan Horse: trojan-backdoor-progdav
1:18 PM: HKLM\system\currentcontrolset\services\com+ messages\ (ID = 1895892)
1:18 PM: HKLM\system\controlset002\services\com+ messages\ (ID = 1895883)
1:18 PM: HKLM\system\controlset002\enum\root\legacy_com+_messages\ (ID = 1895874)
1:18 PM: HKLM\system\controlset001\services\com+ messages\ (ID = 1895861)
1:18 PM: HKLM\system\controlset001\enum\root\legacy_com+_messages\ (ID = 1895850)
1:18 PM: HKLM\software\microsoft\windows\currentversion\uninstall\ipwins\ (ID = 1516581)
1:18 PM: Found Adware: maxifiles
1:18 PM: HKCR\toolbar.toolbarobj.1\ (ID = 127132)
1:18 PM: HKCR\toolbar.toolbarobj\ (ID = 127131)
1:18 PM: Found Adware: hi5 toolbar
1:18 PM: HKLM\software\classes\clsid\{11bdb904-c0bc-41ce-910b-0d12fd619fd0}\ (ID = 107005)
1:18 PM: HKCR\clsid\{11bdb904-c0bc-41ce-910b-0d12fd619fd0}\ (ID = 106999)
1:18 PM: Found Adware: coolsavings
1:18 PM: Starting Registry Sweep
1:18 PM: Memory Sweep Complete, Elapsed Time: 00:09:16
1:18 PM: Warning: Out of memory
1:08 PM: Starting Memory Sweep
1:08 PM: HKLM\system\currentcontrolset\services\com+ messages\ || imagepath (ID = 1910991)
1:08 PM: Found Adware: virtumonde
1:08 PM: Start Full Sweep
1:08 PM: Sweep initiated using definitions version 842
1:08 PM: Spy Sweeper 5.2.3.2138 started
1:08 PM: | Start of Session, Sunday, January 21, 2007 |
********
Mary Ann