Here is the log from Spy Sweeper
********
1:47 PM: | Start of Session, Thursday, November 10, 2005 |
1:47 PM: Spy Sweeper started
1:47 PM: Sweep initiated using definitions version 571
1:47 PM: Starting Memory Sweep
1:50 PM: Memory Sweep Complete, Elapsed Time: 00:02:44
1:50 PM: Starting Registry Sweep
1:50 PM: Found Adware: smart-browser
1:50 PM: HKCR\bho.ibho\ (3 subtraces) (ID = 141846)
1:50 PM: HKCR\interface\{00000183-c745-43d2-44f1-01a1c789c738}\ (8 subtraces) (ID = 141850)
1:50 PM: HKLM\software\classes\bho.ibho\ (3 subtraces) (ID = 141853)
1:50 PM: HKLM\software\classes\interface\{00000183-c745-43d2-44f1-01a1c789c738}\ (8 subtraces) (ID = 141857)
1:50 PM: HKLM\software\classes\typelib\{00000182-c745-43d2-44f1-01a1c789c738}\ (9 subtraces) (ID = 141860)
1:50 PM: HKCR\typelib\{00000182-c745-43d2-44f1-01a1c789c738}\ (9 subtraces) (ID = 141872)
Here is the Hijack log
Logfile of HijackThis v1.99.1
Scan saved at 2:10:49 PM, on 11/10/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\WINDOWS\System32\TCtrlIOHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\WINDOWS\System32\ZoomingHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\TOSHIBA\IVP\ISM\pinger.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\WINDOWS\system32\RAMASST.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\HijackThis\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =
http://www.toshiba.com/searchR0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.toshiba.com/R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://www.toshiba.comR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar =
http://red.clientapp...rch/search.htmlR1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) =
http://red.clientapp...//www.yahoo.comR1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer Provided by Cox High Speed Internet
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - C:\Program Files\Yahoo!\Common\YIeTagBm.dll
O2 - BHO: AOL Toolbar Launcher - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [TCtryIOHook] c:\WINDOWS\System32\TCtrlIOHook.exe
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
O4 - HKLM\..\Run: [ZoomingHook] c:\WINDOWS\System32\ZoomingHook.exe
O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [Pinger] C:\TOSHIBA\IVP\ISM\pinger.exe /run
O4 - HKLM\..\Run: [Notebook Maximizer] C:\Program Files\Notebook Maximizer\maximizer_startup.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [CaAvTray] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe"
O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
O8 - Extra context menu item: &AIM Search - res://C:\Program Files\AIM Toolbar\AIMBar.dll/aimsearch.htm
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .avi: C:\Program Files\Internet Explorer\PLUGINS\npqtplugin.dll
O12 - Plugin for .MPG: C:\Program Files\Internet Explorer\PLUGINS\npqtplugin4.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O12 - Plugin for .wav: C:\Program Files\Internet Explorer\PLUGINS\npqtplugin2.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O15 - Trusted Zone: *.af.mil
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) -
http://housecall60.t...all/xscan60.cabO16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) -
http://a840.g.akamai...all/xscan53.cabO16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) -
http://secure2.comne...login-devel.cabO16 - DPF: {9BFC2253-B9D9-477E-9488-CA450232620D} (BinAg1 Class) -
https://fastconnectk...flowActiveX.CABO20 - Winlogon Notify: winbas - C:\WINDOWS\java\classes\winbas.dll (file missing)
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: DVD-RAM_Service - Matsushita Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
1:50 PM: Found Adware: virtumonde
1:50 PM: HKCR\msevents.msevents\ (5 subtraces) (ID = 749130)
1:50 PM: HKCR\msevents.msevents.1\ (3 subtraces) (ID = 749136)
1:50 PM: HKLM\software\classes\msevents.msevents\ (5 subtraces) (ID = 749153)
1:50 PM: HKLM\software\classes\msevents.msevents.1\ (3 subtraces) (ID = 749157)
1:50 PM: Found Adware: instant access
1:50 PM: HKU\S-1-5-21-3551742482-1681162597-1659207788-1006\software\egdhtml\ (1 subtraces) (ID = 128787)
1:50 PM: HKU\S-1-5-21-3551742482-1681162597-1659207788-1006\software\microsoft\windows\currentversion\wintrust\trust providers\software publishing\trust database\0\ || goicfboogidikkejccmclpieicihhlpo bgdjdn (ID = 128845)
1:50 PM: HKU\S-1-5-21-3551742482-1681162597-1659207788-1006\software\p2eclient\ (1 subtraces) (ID = 128846)
1:50 PM: Registry Sweep Complete, Elapsed Time:00:00:14
1:50 PM: Starting Cookie Sweep
1:50 PM: Found Spy Cookie: 2o7.net cookie
1:50 PM: mario garcia@2o7[1].txt (ID = 1957)
1:50 PM: Found Spy Cookie: websponsors cookie
1:50 PM: mario
[email protected][2].txt (ID = 3665)
1:50 PM: Found Spy Cookie: yieldmanager cookie
1:50 PM: mario
[email protected][1].txt (ID = 3751)
1:50 PM: Found Spy Cookie: adecn cookie
1:50 PM: mario garcia@adecn[2].txt (ID = 2063)
1:50 PM: Found Spy Cookie: adknowledge cookie
1:50 PM: mario garcia@adknowledge[1].txt (ID = 2072)
1:50 PM: Found Spy Cookie: adrevolver cookie
1:50 PM: mario garcia@adrevolver[1].txt (ID = 2088)
1:50 PM: mario garcia@adrevolver[2].txt (ID = 2088)
1:50 PM: Found Spy Cookie: cc214142 cookie
1:50 PM: mario
[email protected][1].txt (ID = 2367)
1:50 PM: Found Spy Cookie: pointroll cookie
1:50 PM: mario
[email protected][2].txt (ID = 3148)
1:50 PM: Found Spy Cookie: adultfriendfinder cookie
1:50 PM: mario garcia@adultfriendfinder[1].txt (ID = 2165)
1:50 PM: Found Spy Cookie: advertising cookie
1:50 PM: mario garcia@advertising[2].txt (ID = 2175)
1:50 PM: Found Spy Cookie: apmebf cookie
1:50 PM: mario garcia@apmebf[2].txt (ID = 2229)
1:50 PM: Found Spy Cookie: ask cookie
1:50 PM: mario garcia@ask[1].txt (ID = 2245)
1:50 PM: Found Spy Cookie: atlas dmt cookie
1:50 PM: mario garcia@atdmt[2].txt (ID = 2253)
1:50 PM: Found Spy Cookie: belnk cookie
1:50 PM: mario
[email protected][2].txt (ID = 2293)
1:50 PM: Found Spy Cookie: atwola cookie
1:50 PM: mario garcia@atwola[1].txt (ID = 2255)
1:50 PM: Found Spy Cookie: banner cookie
1:50 PM: mario garcia@banner[2].txt (ID = 2276)
1:50 PM: mario garcia@belnk[2].txt (ID = 2292)
1:50 PM: Found Spy Cookie: zedo cookie
1:50 PM: mario
[email protected][2].txt (ID = 3763)
1:50 PM: Found Spy Cookie: casalemedia cookie
1:50 PM: mario garcia@casalemedia[1].txt (ID = 2354)
1:50 PM: Found Spy Cookie: centrport net cookie
1:50 PM: mario garcia@centrport[1].txt (ID = 2374)
1:50 PM: Found Spy Cookie: clickbank cookie
1:50 PM: mario garcia@clickbank[2].txt (ID = 2398)
1:50 PM: Found Spy Cookie: coremetrics cookie
1:50 PM: mario
[email protected][1].txt (ID = 2472)
1:50 PM: mario
[email protected][1].txt (ID = 2293)
1:50 PM: Found Spy Cookie: ru4 cookie
1:50 PM: mario
[email protected][2].txt (ID = 3269)
1:50 PM: Found Spy Cookie: fastclick cookie
1:50 PM: mario garcia@fastclick[2].txt (ID = 2651)
1:50 PM: Found Spy Cookie: maxserving cookie
1:50 PM: mario garcia@maxserving[1].txt (ID = 2966)
1:50 PM: mario
[email protected][1].txt (ID = 1958)
1:50 PM: Found Spy Cookie: nextag cookie
1:50 PM: mario garcia@nextag[2].txt (ID = 5014)
1:50 PM: Found Spy Cookie: qksrv cookie
1:50 PM: mario garcia@qksrv[2].txt (ID = 3213)
1:50 PM: Found Spy Cookie: questionmarket cookie
1:50 PM: mario garcia@questionmarket[1].txt (ID = 3217)
1:50 PM: Found Spy Cookie: realmedia cookie
1:50 PM: mario garcia@realmedia[2].txt (ID = 3235)
1:50 PM: Found Spy Cookie: adjuggler cookie
1:50 PM: mario
[email protected][1].txt (ID = 2071)
1:50 PM: Found Spy Cookie: servedby advertising cookie
1:50 PM: mario
[email protected][2].txt (ID = 3335)
1:50 PM: Found Spy Cookie: serving-sys cookie
1:50 PM: mario garcia@serving-sys[2].txt (ID = 3343)
1:50 PM: Found Spy Cookie: tradedoubler cookie
1:50 PM: mario garcia@tradedoubler[2].txt (ID = 3575)
1:50 PM: Found Spy Cookie: trafficmp cookie
1:50 PM: mario garcia@trafficmp[2].txt (ID = 3581)
1:50 PM: Found Spy Cookie: tribalfusion cookie
1:50 PM: mario garcia@tribalfusion[2].txt (ID = 3589)
1:50 PM: Found Spy Cookie: adserver cookie
1:50 PM: mario
[email protected][1].txt (ID = 2142)
1:50 PM: mario garcia@zedo[1].txt (ID = 3762)
1:50 PM: michelle garcia@2o7[1].txt (ID = 1957)
1:50 PM: michelle
[email protected][2].txt (ID = 3665)
1:50 PM: michelle
[email protected][1].txt (ID = 3751)
1:50 PM: michelle garcia@adecn[2].txt (ID = 2063)
1:50 PM: michelle garcia@adknowledge[2].txt (ID = 2072)
1:50 PM: Found Spy Cookie: specificclick.com cookie
1:50 PM: michelle
[email protected][2].txt (ID = 3400)
1:50 PM: michelle garcia@adrevolver[1].txt (ID = 2088)
1:50 PM: michelle garcia@adrevolver[3].txt (ID = 2088)
1:50 PM: Found Spy Cookie: addynamix cookie
1:50 PM: michelle
[email protected][2].txt (ID = 2062)
1:50 PM: michelle garcia@adserver[1].txt (ID = 2141)
1:50 PM: michelle garcia@advertising[2].txt (ID = 2175)
1:50 PM: michelle garcia@apmebf[2].txt (ID = 2229)
1:50 PM: Found Spy Cookie: falkag cookie
1:50 PM: michelle
[email protected][1].txt (ID = 2650)
1:50 PM: michelle garcia@ask[1].txt (ID = 2245)
1:50 PM: michelle garcia@atdmt[1].txt (ID = 2253)
1:50 PM: michelle garcia@atwola[1].txt (ID = 2255)
1:50 PM: Found Spy Cookie: inet-traffic.com cookie
1:50 PM: michelle
[email protected][1].txt (ID = 2856)
1:50 PM: michelle garcia@banner[1].txt (ID = 2276)
1:50 PM: michelle garcia@belnk[1].txt (ID = 2292)
1:50 PM: Found Spy Cookie: bluestreak cookie
1:50 PM: michelle garcia@bluestreak[2].txt (ID = 2314)
1:50 PM: Found Spy Cookie: bravenet cookie
1:50 PM: michelle garcia@bravenet[2].txt (ID = 2322)
1:50 PM: michelle garcia@casalemedia[2].txt (ID = 2354)
1:50 PM: michelle
[email protected][2].txt (ID = 2293)
1:50 PM: michelle garcia@fastclick[2].txt (ID = 2651)
1:50 PM: michelle garcia@inet-traffic[1].txt (ID = 2855)
1:50 PM: michelle
[email protected][1].txt (ID = 1958)
1:50 PM: michelle garcia@nextag[2].txt (ID = 5014)
1:50 PM: Found Spy Cookie: paypopup cookie
1:50 PM: michelle garcia@paypopup[1].txt (ID = 3119)
1:50 PM: Found Spy Cookie: peel network cookie
1:50 PM: michelle garcia@peel[2].txt (ID = 3127)
1:50 PM: michelle garcia@qksrv[2].txt (ID = 3213)
1:50 PM: michelle garcia@questionmarket[1].txt (ID = 3217)
1:50 PM: michelle garcia@realmedia[2].txt (ID = 3235)
1:50 PM: michelle
[email protected][2].txt (ID = 3335)
1:50 PM: michelle garcia@serving-sys[1].txt (ID = 3343)
1:50 PM: Found Spy Cookie: statcounter cookie
1:50 PM: michelle garcia@statcounter[2].txt (ID = 3447)
1:50 PM: Found Spy Cookie: webtrendslive cookie
1:50 PM: michelle
[email protected][1].txt (ID = 3667)
1:50 PM: michelle garcia@tradedoubler[1].txt (ID = 3575)
1:50 PM: michelle garcia@trafficmp[2].txt (ID = 3581)
1:50 PM: michelle garcia@tribalfusion[1].txt (ID = 3589)
1:50 PM: Found Spy Cookie: tripod cookie
1:50 PM: michelle garcia@tripod[1].txt (ID = 3591)
1:50 PM: Found Spy Cookie: ugo cookie
1:50 PM: michelle garcia@ugo[1].txt (ID = 3608)
1:50 PM: michelle
[email protected][2].txt (ID = 2254)
1:50 PM: Found Spy Cookie: hermoment.com cookie
1:50 PM: michelle
[email protected][2].txt (ID = 2774)
1:50 PM: Found Spy Cookie: myaffiliateprogram.com cookie
1:50 PM: michelle
[email protected][1].txt (ID = 3032)
1:50 PM: Found Spy Cookie: yesadvertising cookie
1:50 PM: michelle
[email protected][1].txt (ID = 3745)
1:50 PM: michelle garcia@yesadvertising[2].txt (ID = 3746)
1:50 PM: michelle
[email protected][1].txt (ID = 2142)
1:50 PM: michelle garcia@zedo[2].txt (ID = 3762)
1:50 PM: Cookie Sweep Complete, Elapsed Time: 00:00:06
1:50 PM: Starting File Sweep
1:50 PM: BHO Shield: found: -- BHO installation denied at user request
1:50 PM: c:\program files\sb (9 subtraces) (ID = -2147480318)
1:50 PM: BHO Shield: found: -- BHO installation allowed at user request
1:53 PM: tmlpcert2005 (ID = 63918)
2:07 PM: Warning: Invalid Stream
2:07 PM: Warning: Invalid Stream
2:07 PM: Warning: Invalid Stream
2:07 PM: File Sweep Complete, Elapsed Time: 00:16:57
2:07 PM: Full Sweep has completed. Elapsed time 00:20:05
2:07 PM: Traces Found: 170
2:08 PM: Removal process initiated
2:08 PM: Quarantining All Traces: virtumonde
2:08 PM: Quarantining All Traces: instant access
2:08 PM: Quarantining All Traces: smart-browser
2:08 PM: Quarantining All Traces: 2o7.net cookie
2:08 PM: Quarantining All Traces: addynamix cookie
2:08 PM: Quarantining All Traces: adecn cookie
2:08 PM: Quarantining All Traces: adjuggler cookie
2:08 PM: Quarantining All Traces: adknowledge cookie
2:08 PM: Quarantining All Traces: adrevolver cookie
2:08 PM: Quarantining All Traces: adserver cookie
2:08 PM: Quarantining All Traces: adultfriendfinder cookie
2:08 PM: Quarantining All Traces: advertising cookie
2:08 PM: Quarantining All Traces: apmebf cookie
2:08 PM: Quarantining All Traces: ask cookie
2:08 PM: Quarantining All Traces: atlas dmt cookie
2:08 PM: Quarantining All Traces: atwola cookie
2:08 PM: Quarantining All Traces: banner cookie
2:08 PM: Quarantining All Traces: belnk cookie
2:08 PM: Quarantining All Traces: bluestreak cookie
2:08 PM: Quarantining All Traces: bravenet cookie
2:08 PM: Quarantining All Traces: casalemedia cookie
2:08 PM: Quarantining All Traces: cc214142 cookie
2:08 PM: Quarantining All Traces: centrport net cookie
2:08 PM: Quarantining All Traces: clickbank cookie
2:08 PM: Quarantining All Traces: coremetrics cookie
2:08 PM: Quarantining All Traces: falkag cookie
2:08 PM: Quarantining All Traces: fastclick cookie
2:08 PM: Quarantining All Traces: hermoment.com cookie
2:08 PM: Quarantining All Traces: inet-traffic.com cookie
2:08 PM: Quarantining All Traces: maxserving cookie
2:08 PM: Quarantining All Traces: myaffiliateprogram.com cookie
2:08 PM: Quarantining All Traces: nextag cookie
2:08 PM: Quarantining All Traces: paypopup cookie
2:08 PM: Quarantining All Traces: peel network cookie
2:08 PM: Quarantining All Traces: pointroll cookie
2:08 PM: Quarantining All Traces: qksrv cookie
2:08 PM: Quarantining All Traces: questionmarket cookie
2:08 PM: Quarantining All Traces: realmedia cookie
2:08 PM: Quarantining All Traces: ru4 cookie
2:08 PM: Quarantining All Traces: servedby advertising cookie
2:08 PM: Quarantining All Traces: serving-sys cookie
2:08 PM: Quarantining All Traces: specificclick.com cookie
2:08 PM: Quarantining All Traces: statcounter cookie
2:08 PM: Quarantining All Traces: tradedoubler cookie
2:08 PM: Quarantining All Traces: trafficmp cookie
2:08 PM: Quarantining All Traces: tribalfusion cookie
2:08 PM: Quarantining All Traces: tripod cookie
2:08 PM: Quarantining All Traces: ugo cookie
2:08 PM: Quarantining All Traces: websponsors cookie
2:08 PM: Quarantining All Traces: webtrendslive cookie
2:08 PM: Quarantining All Traces: yesadvertising cookie
2:08 PM: Quarantining All Traces: yieldmanager cookie
2:08 PM: Quarantining All Traces: zedo cookie
2:08 PM: Removal process completed. Elapsed time 00:00:14
********
1:44 PM: | Start of Session, Thursday, November 10, 2005 |
1:44 PM: Spy Sweeper started
1:46 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
1:46 PM: The Spy Communication shield has blocked access to: banners.pennyweb.com
1:47 PM: | End of Session, Thursday, November 10, 2005 |