HiJack ThisLogfile of HijackThis v1.99.1
Scan saved at 5:55:54 PM, on 11/28/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
c:\program files\mcafee.com\agent\mcdetect.exe
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
c:\PROGRA~1\mcafee.com\agent\mctskshd.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\ScsiAccess.EXE
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
C:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\McAfee.com\VSO\mcvsshld.exe
C:\Program Files\Dell AIO Printer A960\dlbfbmgr.exe
c:\progra~1\mcafee.com\vso\mcvsescn.exe
C:\Program Files\Dell AIO Printer A960\dlbfbmon.exe
C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe
C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\system32\MAFWTray.exe
C:\Program Files\McAfee.com\VSO\oasclnt.exe
C:\Program Files\Dell Support\DSAgnt.exe
C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\Playlist.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Hijackthis\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://www.dell4me.com/mywayR0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.dell4me.com/mywayO2 - BHO: (no name) - {00DBDAC8-4691-4797-8E6A-7C6AB89BC441} - C:\WINDOWS\system32\pmnno.dll
O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [IntelMeM] C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [mmtask] c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
O4 - HKLM\..\Run: [VSOCheckTask] "C:\PROGRA~1\McAfee.com\VSO\mcmnhdlr.exe" /checktask
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
O4 - HKLM\..\Run: [VirusScan Online] C:\Program Files\McAfee.com\VSO\mcvsshld.exe
O4 - HKLM\..\Run: [Dell AIO Printer A960] "C:\Program Files\Dell AIO Printer A960\dlbfbmgr.exe"
O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Tweak UI] RUNDLL32.EXE TWEAKUI.CPL,TweakMeUp
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [MAFWTaskbarApp] C:\WINDOWS\system32\MAFWTray.exe
O4 - HKLM\..\Run: [OASClnt] C:\Program Files\McAfee.com\VSO\oasclnt.exe
O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\ypager.exe" -quiet
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll (file missing)
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll (file missing)
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0411.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0411.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6BB594E2-6E4D-4CC9-98B0-931C323F9165} (DepHlp Control) -
http://mirror.worldw...ared/dephlp.cabO16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) -
http://acs.pandasoft...free/asinst.cabO16 - DPF: {FAE74270-E5EE-49C3-B816-EA8B4D55F38F} (H2hPool Control) -
http://mirror.worldw...ool/h2hpool.cabO20 - Winlogon Notify: pmnno - C:\WINDOWS\SYSTEM32\pmnno.dll
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O21 - SSODL: RealPlayer 6.0 - {DBE97A3B-3A34-4AFE-15EA-209C707974DD} - C:\Program Files\Real\RealPlayer.dll (file missing)
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: McAfee WSC Integration (McDetect.exe) - McAfee, Inc - c:\program files\mcafee.com\agent\mcdetect.exe
O23 - Service: McAfee.com McShield (McShield) - McAfee Inc. - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee Task Scheduler (McTskshd.exe) - McAfee, Inc - c:\PROGRA~1\mcafee.com\agent\mctskshd.exe
O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - McAfee, Inc - C:\PROGRA~1\McAfee.com\Agent\mcupdmgr.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\System32\ScsiAccess.EXE
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
spysweeper4:56 PM: | Start of Session, Monday, November 28, 2005 |
4:56 PM: Spy Sweeper started
4:56 PM: Sweep initiated using definitions version 574
4:56 PM: Starting Memory Sweep
4:57 PM: Found Adware: virtumonde
4:57 PM: Detected running threat: C:\WINDOWS\SYSTEM32\vturr.dll (ID = 77)
5:02 PM: Memory Sweep Complete, Elapsed Time: 00:05:17
5:02 PM: Starting Registry Sweep
5:02 PM: Found Trojan Horse: 2nd-thought
5:02 PM: HKCR\interface\{6e0ed53c-9908-49ed-b055-7cb31b162577}\ (7 subtraces) (ID = 101978)
5:02 PM: HKCR\interface\{8c53bd8e-b12d-4c8f-ad0e-c9ddc39d1273}\ (8 subtraces) (ID = 101979)
5:02 PM: HKCR\interface\{9bcdd51b-4a7b-446c-8452-d32d38004582}\ (7 subtraces) (ID = 101980)
5:02 PM: HKCR\interface\{49db48ff-02b5-4645-b676-94a4df1aa026}\ (7 subtraces) (ID = 101981)
5:02 PM: HKCR\interface\{830d3aed-2fa9-454f-b266-d931862bbf34}\ (7 subtraces) (ID = 101982)
5:02 PM: HKCR\interface\{a986f4db-792e-4571-8974-0bb6e024766f}\ (7 subtraces) (ID = 101983)
5:02 PM: HKCR\interface\{bccab53d-0895-40c3-a942-a03538ce227a}\ (7 subtraces) (ID = 101984)
5:02 PM: HKCR\interface\{c0f88e9e-dceb-4655-968a-ae508a677c39}\ (7 subtraces) (ID = 101985)
5:02 PM: HKCR\interface\{d7eac2d8-2d52-4010-a4ad-dfdf60c1706c}\ (7 subtraces) (ID = 101986)
5:02 PM: HKLM\software\classes\interface\{6e0ed53c-9908-49ed-b055-7cb31b162577}\ (7 subtraces) (ID = 101993)
5:02 PM: HKLM\software\classes\interface\{8c53bd8e-b12d-4c8f-ad0e-c9ddc39d1273}\ (8 subtraces) (ID = 101994)
5:02 PM: HKLM\software\classes\interface\{9bcdd51b-4a7b-446c-8452-d32d38004582}\ (7 subtraces) (ID = 101995)
5:02 PM: HKLM\software\classes\interface\{49db48ff-02b5-4645-b676-94a4df1aa026}\ (7 subtraces) (ID = 101996)
5:02 PM: HKLM\software\classes\interface\{830d3aed-2fa9-454f-b266-d931862bbf34}\ (7 subtraces) (ID = 101997)
5:02 PM: HKLM\software\classes\interface\{a986f4db-792e-4571-8974-0bb6e024766f}\ (7 subtraces) (ID = 101998)
5:02 PM: HKLM\software\classes\interface\{bccab53d-0895-40c3-a942-a03538ce227a}\ (7 subtraces) (ID = 101999)
5:02 PM: HKLM\software\classes\interface\{c0f88e9e-dceb-4655-968a-ae508a677c39}\ (7 subtraces) (ID = 102000)
5:02 PM: HKLM\software\classes\interface\{d7eac2d8-2d52-4010-a4ad-dfdf60c1706c}\ (7 subtraces) (ID = 102001)
5:02 PM: Found Adware: addestroyer
5:02 PM: HKCR\clsid\{417386c3-8d4a-4611-9b91-e57e89d603ac}\ (13 subtraces) (ID = 102728)
5:02 PM: HKCR\clsid\{d52433a9-a44c-43ab-a013-24b3c756dd2b}\ (13 subtraces) (ID = 102729)
5:02 PM: HKCR\interface\{10d7db96-56dc-4617-8eab-ec506abe6c7e}\ (8 subtraces) (ID = 102730)
5:02 PM: HKCR\interface\{6cdc3337-01f7-4a79-a4af-0b19303cc0be}\ (8 subtraces) (ID = 102732)
5:02 PM: HKCR\interface\{795398d0-dc2f-4118-a69c-592273ba9c2b}\ (8 subtraces) (ID = 102733)
5:02 PM: HKCR\interface\{b288f21c-a144-4ca2-9b70-8afa1fae4b06}\ (8 subtraces) (ID = 102734)
5:02 PM: HKCR\popoops2.popoops\ (3 subtraces) (ID = 102735)
5:02 PM: HKCR\swlad1.swlad\ (3 subtraces) (ID = 102736)
5:02 PM: HKLM\software\classes\clsid\{417386c3-8d4a-4611-9b91-e57e89d603ac}\ (13 subtraces) (ID = 102737)
5:02 PM: HKLM\software\classes\clsid\{d52433a9-a44c-43ab-a013-24b3c756dd2b}\ (13 subtraces) (ID = 102738)
5:02 PM: HKLM\software\classes\interface\{10d7db96-56dc-4617-8eab-ec506abe6c7e}\ (8 subtraces) (ID = 102739)
5:02 PM: HKLM\software\classes\interface\{6cdc3337-01f7-4a79-a4af-0b19303cc0be}\ (8 subtraces) (ID = 102741)
5:02 PM: HKLM\software\classes\interface\{795398d0-dc2f-4118-a69c-592273ba9c2b}\ (8 subtraces) (ID = 102742)
5:02 PM: HKLM\software\classes\interface\{b288f21c-a144-4ca2-9b70-8afa1fae4b06}\ (8 subtraces) (ID = 102743)
5:02 PM: HKLM\software\classes\popoops2.popoops\ (3 subtraces) (ID = 102744)
5:02 PM: HKLM\software\classes\swlad1.swlad\ (3 subtraces) (ID = 102745)
5:02 PM: HKLM\software\classes\typelib\{d0c29a75-7146-4737-98ee-bc4d7cf44af9}\ (9 subtraces) (ID = 102746)
5:02 PM: HKLM\software\classes\typelib\{e0d3b292-a0b0-4640-975c-2f882e039f52}\ (9 subtraces) (ID = 102747)
5:02 PM: HKCR\typelib\{d0c29a75-7146-4737-98ee-bc4d7cf44af9}\ (9 subtraces) (ID = 102750)
5:02 PM: HKCR\typelib\{e0d3b292-a0b0-4640-975c-2f882e039f52}\ (9 subtraces) (ID = 102751)
5:02 PM: Found Adware: networkessentials
5:02 PM: HKLM\software\microsoft\windows\currentversion\uninstall\recommended hotfix - 421701d\ (2 subtraces) (ID = 136174)
5:02 PM: Found Adware: websearch toolbar
5:02 PM: HKLM\system\currentcontrolset\enum\root\legacy_wintoolssvc\ (7 subtraces) (ID = 146518)
5:02 PM: Found Adware: virtualbouncer
5:02 PM: HKCR\clsid\{8551311d-f3bf-4718-ad66-96e302500735}\ (11 subtraces) (ID = 392235)
5:02 PM: HKLM\software\classes\clsid\{18bbdf4d-611d-41ce-a7e7-b2dd23c250d1}\ (11 subtraces) (ID = 392390)
5:02 PM: HKCR\popoops2.popoops\ (3 subtraces) (ID = 466854)
5:02 PM: HKCR\popoops2.popoops\ (3 subtraces) (ID = 466855)
5:02 PM: HKCR\popoops2.popoops\clsid\ (1 subtraces) (ID = 466856)
5:02 PM: HKLM\software\classes\popoops2.popoops\ (3 subtraces) (ID = 466858)
5:02 PM: HKLM\software\classes\popoops2.popoops\ (3 subtraces) (ID = 466859)
5:02 PM: HKLM\software\classes\popoops2.popoops\clsid\ (1 subtraces) (ID = 466860)
5:02 PM: HKLM\software\classes\clsid\{8551311d-f3bf-4718-ad66-96e302500735}\ (11 subtraces) (ID = 476604)
5:02 PM: Found Adware: dealhelper
5:02 PM: HKLM\software\ddate\ (1 subtraces) (ID = 636618)
5:02 PM: Found Trojan Horse: trojan-downloader-conhook
5:02 PM: HKLM\software\classes\clsid\{00dbdac8-4691-4797-8e6a-7c6ab89bc441}\ (3 subtraces) (ID = 833627)
5:02 PM: HKCR\clsid\{00dbdac8-4691-4797-8e6a-7c6ab89bc441}\ (3 subtraces) (ID = 833628)
5:02 PM: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objects\{00dbdac8-4691-4797-8e6a-7c6ab89bc441}\ (ID = 833629)
5:02 PM: Found Adware: cws-aboutblank
5:02 PM: HKU\S-1-5-21-1960002495-1453048257-2456387496-1007\software\microsoft\internet explorer\main\ || search bar_bak (ID = 115924)
5:02 PM: HKU\S-1-5-21-1960002495-1453048257-2456387496-1007\software\microsoft\internet explorer\main\ || search page_bak (ID = 115925)
5:02 PM: Found Adware: ist sidefind
5:02 PM: HKU\S-1-5-21-1960002495-1453048257-2456387496-1007\software\microsoft\internet explorer\extensions\cmdmapping\ || {10e42047-deb9-4535-a118-b3f6ec39b807} (ID = 141778)
5:02 PM: HKU\S-1-5-21-1960002495-1453048257-2456387496-1007\software\microsoft\internet explorer\main\ || search page_bak (ID = 774883)
5:02 PM: Registry Sweep Complete, Elapsed Time:00:00:46
5:02 PM: Starting Cookie Sweep
5:02 PM: Found Spy Cookie: 247realmedia cookie
5:02 PM: orlando rios@247realmedia[1].txt (ID = 1953)
5:02 PM: Found Spy Cookie: 2o7.net cookie
5:02 PM: orlando rios@2o7[1].txt (ID = 1957)
5:02 PM: Found Spy Cookie: yieldmanager cookie
5:02 PM: orlando
[email protected][2].txt (ID = 3751)
5:02 PM: Found Spy Cookie: adknowledge cookie
5:02 PM: orlando rios@adknowledge[1].txt (ID = 2072)
5:02 PM: Found Spy Cookie: adrevolver cookie
5:02 PM: orlando rios@adrevolver[2].txt (ID = 2088)
5:02 PM: orlando rios@adrevolver[3].txt (ID = 2088)
5:02 PM: Found Spy Cookie: pointroll cookie
5:02 PM: orlando
[email protected][2].txt (ID = 3148)
5:02 PM: Found Spy Cookie: adultfriendfinder cookie
5:02 PM: orlando rios@adultfriendfinder[1].txt (ID = 2165)
5:02 PM: Found Spy Cookie: advertising cookie
5:02 PM: orlando rios@advertising[2].txt (ID = 2175)
5:02 PM: Found Spy Cookie: atwola cookie
5:02 PM: orlando
[email protected][1].txt (ID = 2256)
5:02 PM: Found Spy Cookie: falkag cookie
5:02 PM: orlando
[email protected][1].txt (ID = 2650)
5:02 PM: Found Spy Cookie: atlas dmt cookie
5:02 PM: orlando rios@atdmt[2].txt (ID = 2253)
5:02 PM: orlando rios@atwola[1].txt (ID = 2255)
5:02 PM: Found Spy Cookie: banner cookie
5:02 PM: orlando rios@banner[1].txt (ID = 2276)
5:02 PM: Found Spy Cookie: casalemedia cookie
5:02 PM: orlando rios@casalemedia[2].txt (ID = 2354)
5:02 PM: Found Spy Cookie: centrport net cookie
5:02 PM: orlando rios@centrport[1].txt (ID = 2374)
5:02 PM: Found Spy Cookie: ru4 cookie
5:02 PM: orlando
[email protected][1].txt (ID = 3269)
5:02 PM: Found Spy Cookie: fastclick cookie
5:02 PM: orlando rios@fastclick[2].txt (ID = 2651)
5:02 PM: Found Spy Cookie: nextag cookie
5:02 PM: orlando rios@nextag[2].txt (ID = 5014)
5:02 PM: Found Spy Cookie: overture cookie
5:02 PM: orlando
[email protected][1].txt (ID = 3106)
5:02 PM: Found Spy Cookie: questionmarket cookie
5:02 PM: orlando rios@questionmarket[1].txt (ID = 3217)
5:02 PM: Found Spy Cookie: realmedia cookie
5:02 PM: orlando rios@realmedia[2].txt (ID = 3235)
5:02 PM: Found Spy Cookie: reliablestats cookie
5:02 PM: orlando
[email protected][1].txt (ID = 3254)
5:02 PM: Found Spy Cookie: tradedoubler cookie
5:02 PM: orlando rios@tradedoubler[2].txt (ID = 3575)
5:02 PM: Found Spy Cookie: tribalfusion cookie
5:02 PM: orlando rios@tribalfusion[1].txt (ID = 3589)
5:02 PM: orlando rios@yieldmanager[2].txt (ID = 3749)
5:02 PM: Cookie Sweep Complete, Elapsed Time: 00:00:02
5:02 PM: Starting File Sweep
5:03 PM: c:\windows\system32\newmsrdk (ID = -2147481534)
5:03 PM: Found Adware: winad
5:03 PM: c:\program files\windows taskad (1 subtraces) (ID = -2147480014)
5:04 PM: Found Adware: ezula ilookup
5:04 PM: woinstall.exe (ID = 60687)
5:05 PM: Found Adware: zestyfind desktop links
5:05 PM: iconz3.exe (ID = 91154)
5:05 PM: a0048868.exe (ID = 91154)
5:06 PM: awtsr.dll (ID = 156901)
5:09 PM: inneradinstall.log (ID = 49035)
5:18 PM: a0048869.dll (ID = 156901)
5:25 PM: a0048867.exe (ID = 60687)
5:33 PM: Warning: Invalid file - not a PKZip file
5:34 PM: File Sweep Complete, Elapsed Time: 00:31:08
5:34 PM: Full Sweep has completed. Elapsed time 00:37:23
5:34 PM: Traces Found: 449
5:35 PM: Removal process initiated
5:37 PM: Quarantining All Traces: 2nd-thought
5:37 PM: Quarantining All Traces: cws-aboutblank
5:37 PM: Quarantining All Traces: virtumonde
5:37 PM: virtumonde is in use. It will be removed on reboot.
5:37 PM: C:\WINDOWS\SYSTEM32\vturr.dll is in use. It will be removed on reboot.
5:37 PM: Quarantining All Traces: websearch toolbar
5:37 PM: Quarantining All Traces: trojan-downloader-conhook
5:37 PM: Quarantining All Traces: addestroyer
5:38 PM: Quarantining All Traces: dealhelper
5:38 PM: Quarantining All Traces: ezula ilookup
5:38 PM: Quarantining All Traces: ist sidefind
5:38 PM: Quarantining All Traces: networkessentials
5:38 PM: Quarantining All Traces: virtualbouncer
5:38 PM: Quarantining All Traces: winad
5:38 PM: Quarantining All Traces: zestyfind desktop links
5:38 PM: Quarantining All Traces: 247realmedia cookie
5:38 PM: Quarantining All Traces: 2o7.net cookie
5:38 PM: Quarantining All Traces: adknowledge cookie
5:38 PM: Quarantining All Traces: adrevolver cookie
5:38 PM: Quarantining All Traces: adultfriendfinder cookie
5:38 PM: Quarantining All Traces: advertising cookie
5:38 PM: Quarantining All Traces: atlas dmt cookie
5:38 PM: Quarantining All Traces: atwola cookie
5:38 PM: Quarantining All Traces: banner cookie
5:38 PM: Quarantining All Traces: casalemedia cookie
5:38 PM: Quarantining All Traces: centrport net cookie
5:38 PM: Quarantining All Traces: falkag cookie
5:38 PM: Quarantining All Traces: fastclick cookie
5:38 PM: Quarantining All Traces: nextag cookie
5:38 PM: Quarantining All Traces: overture cookie
5:38 PM: Quarantining All Traces: pointroll cookie
5:38 PM: Quarantining All Traces: questionmarket cookie
5:38 PM: Quarantining All Traces: realmedia cookie
5:38 PM: Quarantining All Traces: reliablestats cookie
5:38 PM: Quarantining All Traces: ru4 cookie
5:38 PM: Quarantining All Traces: tradedoubler cookie
5:38 PM: Quarantining All Traces: tribalfusion cookie
5:38 PM: Quarantining All Traces: yieldmanager cookie
5:39 PM: Removal process completed. Elapsed time 00:04:17
5:41 PM: | End of Session, Monday, November 28, 2005 |
********
4:52 PM: | Start of Session, Monday, November 28, 2005 |
4:52 PM: Spy Sweeper started
4:54 PM: Your spyware definitions have been updated.
4:56 PM: | End of Session, Monday, November 28, 2005 |