Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:08:51 PM, on 2/1/2008
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal
Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINNT\system32\hidserv.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\mspmspsv.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\tp4serv.exe
C:\Program Files\NETGEAR\WG511\Utility\WG511WLU.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINNT\system32\ntvdm.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {8EDB0DC7-ECDF-4E5B-A55C-FA0BEECC6DC0} - C:\WINNT\system32\deskad.dll
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [TrackPointSrv] tp4serv.exe
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [WG511WLU] C:\Program Files\NETGEAR\WG511\Utility\WG511WLU.exe -hide
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet
O4 - HKCU\..\Run: [Windows update loader] C:\Windows\xpupdate.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\.DEFAULT\..\RunOnce: [^SetupICWDesktop] C:\Program Files\Internet Explorer\Connection Wizard\icwconn1.exe /desktop (User 'Default user')
O4 - Startup: PowerReg Scheduler V3.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {37625982-645F-4516-8FA4-0EC7EA55AA5B} (CorasWorks My Workplace for Outlook - My Outlook) - https://cent.co-act....0ebcd7/MOLC.CAB
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.m...ash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{1D563DEC-33CD-4E5E-B174-8BF9C740CF10}: NameServer = 85.255.114.11,85.255.112.73
O17 - HKLM\System\CCS\Services\Tcpip\..\{9A849A83-D3B4-43DF-8C9C-ECDB8417D140}: NameServer = 85.255.114.11,85.255.112.73
O17 - HKLM\System\CS1\Services\Tcpip\..\{1D563DEC-33CD-4E5E-B174-8BF9C740CF10}: NameServer = 85.255.114.11,85.255.112.73
O17 - HKLM\System\CS2\Services\Tcpip\..\{1D563DEC-33CD-4E5E-B174-8BF9C740CF10}: NameServer = 85.255.114.11,85.255.112.73
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
--
End of file - 4507 bytes
------------------------------------------
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 01/31/2008 at 08:28 PM
Application Version : 3.9.1008
Core Rules Database Version : 3392
Trace Rules Database Version: 1384
Scan type : Complete Scan
Total Scan Time : 02:10:20
Memory items scanned : 253
Memory threats detected : 0
Registry items scanned : 3953
Registry threats detected : 12
File items scanned : 32832
File threats detected : 135
Parasite.WareOut
HKLM\Software\Classes\CLSID\{46639D99-7D26-7374-728A-4F6DBA585E76}
HKCR\CLSID\{46639D99-7D26-7374-728A-4F6DBA585E76}
HKCR\CLSID\{46639D99-7D26-7374-728A-4F6DBA585E76}\InprocServer32
PANEL_ITS.DLL
Adware.Tracking Cookie
C:\Documents and Settings\Laptop\Cookies\laptop@2682[2].txt
C:\Documents and Settings\Laptop\Cookies\[email protected][1].txt
C:\Documents and Settings\Laptop\Cookies\[email protected][1].txt
C:\Documents and Settings\Laptop\Cookies\laptop@overture[1].txt
C:\Documents and Settings\Laptop\Cookies\laptop@2o7[2].txt
C:\Documents and Settings\Laptop\Cookies\laptop@questionmarket[2].txt
C:\Documents and Settings\Laptop\Cookies\[email protected][2].txt
C:\Documents and Settings\Laptop\Cookies\laptop@gomyron[1].txt
C:\Documents and Settings\Laptop\Cookies\laptop@55170107[2].txt
C:\Documents and Settings\Laptop\Cookies\[email protected][1].txt
Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc
Browser Hijacker.Favorites
C:\Documents and Settings\Laptop\Favorites\Download Free Spyware Remover.url
C:\Documents and Settings\All Users\Favorites\Download Free Spyware Remover.url
C:\Documents and Settings\Laptop\Favorites\NEW VIAGRA at Half Price!.url
C:\Documents and Settings\All Users\Favorites\NEW VIAGRA at Half Price!.url
C:\Documents and Settings\Laptop\Favorites\Online Chat With Nude Girls.url
C:\Documents and Settings\All Users\Favorites\Online Chat With Nude Girls.url
C:\Documents and Settings\Laptop\Favorites\Order CIALIS online without leaving home..url
C:\Documents and Settings\All Users\Favorites\Order CIALIS online without leaving home..url
C:\Documents and Settings\Laptop\Favorites\PC protection in under 2 minutes!.url
C:\Documents and Settings\All Users\Favorites\PC protection in under 2 minutes!.url
C:\Documents and Settings\Laptop\Favorites\SEX Dating - Real Girls For Real SEX.url
C:\Documents and Settings\All Users\Favorites\SEX Dating - Real Girls For Real SEX.url
C:\Documents and Settings\Laptop\Favorites\Stop PopUps On Your Computer.url
C:\Documents and Settings\All Users\Favorites\Stop PopUps On Your Computer.url
C:\Documents and Settings\Laptop\Favorites\VIAGRA at incredible low price. Bonus Pills!.url
C:\Documents and Settings\All Users\Favorites\VIAGRA at incredible low price. Bonus Pills!.url
C:\Documents and Settings\Laptop\Favorites\View ADULT photos of REAL GIRLS!.url
C:\Documents and Settings\All Users\Favorites\View ADULT photos of REAL GIRLS!.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\CHEAPEST VIAGRA ONLINE.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\Cialis at HALF PRICE!.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\Fast Way To Loose Your Weight!.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\Guaranteed low price at Pills..url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\SOMA at Special LOW PRICE.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\Tramadol Special Offer!.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy\Try New VIAGRA! Works Faster and Longer!.url
C:\Documents and Settings\All Users\Favorites\Online Pharmacy
C:\Documents and Settings\Laptop\Favorites\Sex and Dating\Meet Girls Who Want To Get Laid!.url
C:\Documents and Settings\Laptop\Favorites\Sex and Dating\Meet Horny Girls In Your Area!.url
C:\Documents and Settings\Laptop\Favorites\Sex and Dating\Read profiles and Chat With Nude Girls!.url
C:\Documents and Settings\Laptop\Favorites\Sex and Dating\SEX Dating - people looking for SEX.url
C:\Documents and Settings\Laptop\Favorites\Sex and Dating\View XXX photos of Real Sexy Girls..url
C:\Documents and Settings\Laptop\Favorites\Sex and Dating
C:\Documents and Settings\All Users\Favorites\Sex and Dating\Meet Girls Who Want To Get Laid!.url
C:\Documents and Settings\All Users\Favorites\Sex and Dating\Meet Horny Girls In Your Area!.url
C:\Documents and Settings\All Users\Favorites\Sex and Dating\Read profiles and Chat With Nude Girls!.url
C:\Documents and Settings\All Users\Favorites\Sex and Dating\SEX Dating - people looking for SEX.url
C:\Documents and Settings\All Users\Favorites\Sex and Dating\View XXX photos of Real Sexy Girls..url
C:\Documents and Settings\All Users\Favorites\Sex and Dating
C:\Documents and Settings\Laptop\Favorites\Spyware Uninstall\Easy Detect and Uninstall Spyware..url
C:\Documents and Settings\Laptop\Favorites\Spyware Uninstall\Free Spyware Scanner..url
C:\Documents and Settings\Laptop\Favorites\Spyware Uninstall\Search & Destroy Annoying Adware..url
C:\Documents and Settings\Laptop\Favorites\Spyware Uninstall\Stop PopUps on your PC..url
C:\Documents and Settings\Laptop\Favorites\Spyware Uninstall
C:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Easy Detect and Uninstall Spyware..url
C:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Free Spyware Scanner..url
C:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Search & Destroy Annoying Adware..url
C:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Stop PopUps on your PC..url
C:\Documents and Settings\All Users\Favorites\Spyware Uninstall
Malware.SpyMarshal
C:\Program Files\SpyMarshal\SpyMarshal.lic
C:\Program Files\SpyMarshal
Trace.Known Threat Sources
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MRSRYDW7\CA1GNE3B.php
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\CAOPILB8.
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\2682kipgbuck[1].exe
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\i53b_icon5[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\CHIJO9QV\i53b_btn-home[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\CHIJO9QV\i53b_btn-overview[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\KHI3G56Z\i53b_icon3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\8DEVWT2F\i53b_brd-top-1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\crypt[2].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\CHIJO9QV\i53b_brd-bot-1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\KHI3G56Z\i53b_boton4[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\KHI3G56Z\i53b_line3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\KHI3G56Z\i53b_icon1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\i53b_btn-download[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SJJ7AS1T\i88_log[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\2682bgmyeckt[1].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\8DEVWT2F\i53b_btn-updates[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\errorhandler[1].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\8DEVWT2F\i53b_btn-features[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\i53b_t1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\KHI3G56Z\i53b_line2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\errorhandler[2].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\i53b_boton2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MVMFQPQR\i53b_btn-purchase[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\BJTFBPG8\i88_top[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\BJTFBPG8\i88_k2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\8DEVWT2F\i53b_bg1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\VQK37P05\i88_fon[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\BJTFBPG8\i88_r2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SJJ7AS1T\i88_boot[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\VQK37P05\CAWP6912.
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\BJTFBPG8\i88_r3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\crypt[1].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\managers[2].js
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i35_no_flash[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i35_my_03[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\index[1].php
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i89_boot[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\CA6FM3E1.
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i35_fon2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i35_malt[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i35_txtop[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i35_my_01[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i35_bot5[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i35_bot6[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i35_bot3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\index[3].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i89_anim[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i44_boton[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i35_fon1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i89_str[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i44_lintb[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i89_im[1].jpg
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i89_zn[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\autoresize[1].htm
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i44_u1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i44_f3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i89_boton[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i44_fonflash[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i44_ug2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i44_ic2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i44_ug3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\CACPYJGN.php
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i35_botfin3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i44_ug1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\CAE7SPAH.php
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\index[1].php
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i44_f2[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\S12F0LYN\i44_lin[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\STM7S1YZ\i44_ic4[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\MRSRYDW7\index[1].php
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i44_ic1[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\SHE7OX2Z\i44_ic3[1].gif
C:\Documents and Settings\Laptop\Local Settings\Temporary Internet Files\Content.IE5\816FA7KX\CA0X2JSH.
---------------------------------------------
Activescan log:
Incident Status Location
Potentially unwanted tool:Application/PRScheduler Not disinfected C:\Documents and Settings\Laptop\Start Menu\Programs\Startup\PowerReg Scheduler V3.exe
Adware:adware/ideskbar Not disinfected c:\winnt\system32\drivers\zpmodemnt.sys
Adware:adware/dloader Not disinfected c:\winnt\system32\msblank.html
Adware:adware/sbsoft Not disinfected c:\winnt\rdt.ini
Adware:adware/megatds Not disinfected Windows Registry
Spyware:Cookie/Go Not disinfected C:\Documents and Settings\Laptop\Cookies\laptop@go[2].txt
Spyware:Cookie/Overture Not disinfected C:\Documents and Settings\Laptop\Cookies\laptop@overture[1].txt
Hacktool:Exploit/iFrame Not disinfected C:\Documents and Settings\Laptop\Local Settings\Temp\Temporary Internet Files\Content.IE5\KR2X2NU3\wpad[1].htm