1
   

favoriteman, clipgenie, sahagent, 180solutions + more. ARG.

 
 
Reply Fri 9 Apr, 2004 10:14 am
i need some help. i updated my antivirus software, and ran that. cleaned up the computer, quarantined 10 different things.
what im pasting is the most recent scan with ad-aware that i have done. all 234 of these files have been quarantined. but, i have done this before, for all of the same stuff, so obviously there is something really wrong here.
and a stupid question: i had set up user names about a month ago. now there is one left (b/c i was afraid to delete it, didnt know if i could still go back on my computer if i did...i assume tho that deleting the last user name just means you dont need a password for windows anymore). im thinkin i should delete that right? files saved on the regular default user and the seperate user id are duplicates right? so this could go on forever? im probably 100% wrong, someone please explain it to me!
heres the scan: what do i do now?

Lavasoft Ad-aware Personal Build 6.181
Logfile created on :Friday, April 09, 2004 11:14:58 AM
Created with Ad-aware Personal, free for private use.
Using reference-file :01R277 29.03.2004
______________________________________________________

Ad-aware Settings
=========================
Set : Activate in-depth scan (Recommended)
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep scan registry


04-09-2004 11:14:58 AM - Scan started. (Smart mode)

Listing running processes
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

#:1 [kernel32.dll]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4279184585
Threads : 4
Priority : High
FileSize : 460 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1991-1999
CompanyName : Microsoft Corporation
FileDescription : Win32 Kernel core component
InternalName : KERNEL32
OriginalFilename : KERNEL32.DLL
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:2 [msgsrv32.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294956465
Threads : 1
Priority : Normal
FileSize : 11 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1992-1998
CompanyName : Microsoft Corporation
FileDescription : Windows 32-bit VxD Message Server
InternalName : MSGSRV32
OriginalFilename : MSGSRV32.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:3 [mprexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294961953
Threads : 1
Priority : Normal
FileSize : 28 KB
FileVersion : 4.10.1998
ProductVersion : 4.10.1998
Copyright : Copyright (C) Microsoft Corp. 1993-1998
CompanyName : Microsoft Corporation
FileDescription : WIN32 Network Interface Service Process
InternalName : MPREXE
OriginalFilename : MPREXE.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:4 [gwmdmmsg.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294935881
Threads : 2
Priority : Normal
FileSize : 98 KB
FileVersion : 3.3.12.1 07/21/2001 10:47:04
ProductVersion : 3.3.12.1 07/21/2001 10:47:04
Copyright : Copyright
CompanyName : GTW
FileDescription : Modem Messaging Applet
InternalName : smdmstat.exe
OriginalFilename : smdmstat.exe
ProductName : GTW Modem Messaging Applet
Created on : 08/16/2001 6:43:48 PM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 07/21/2001 5:47:06 PM

#:5 [mmtask.tsk]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294889001
Threads : 1
Priority : Normal
FileSize : 1 KB
FileVersion : 4.03.1998
ProductVersion : 4.03.1998
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Multimedia background task support module
InternalName : mmtask.tsk
OriginalFilename : mmtask.tsk
ProductName : Microsoft Windows
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:6 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294862881
Threads : 25
Priority : Normal
FileSize : 176 KB
FileVersion : 4.72.3110.1
ProductVersion : 4.72.3110.1
Copyright : Copyright (C) Microsoft Corp. 1981-1997
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
OriginalFilename : EXPLORER.EXE
ProductName : Microsoft(R) Windows NT(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:7 [systray.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294796581
Threads : 2
Priority : Normal
FileSize : 32 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1993-1998
CompanyName : Microsoft Corporation
FileDescription : System Tray Applet
InternalName : SYSTRAY
OriginalFilename : SYSTRAY.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:8 [navapw32.exe]
FilePath : C:\PROGRAM FILES\NORTON ANTIVIRUS\
ProcessID : 4294777569
Threads : 6
Priority : Normal
FileSize : 48 KB
FileVersion : 7.07.00.23
ProductVersion : 7.07.00.23
Copyright : Copyright (C) 2000 Symantec Corporation. All rights reserved.
CompanyName : Symantec Corporation
FileDescription : Norton AntiVirus Auto-Protect Agent
InternalName : NAVAPW32
OriginalFilename : NAVAPW32.DLL
ProductName : Norton AntiVirus
Created on : 04/27/2001 2:29:26 AM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 02/14/2001 1:00:00 PM

#:9 [stimon.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294779109
Threads : 3
Priority : Normal
FileSize : 112 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1996-1998
CompanyName : Microsoft Corporation
FileDescription : Still Image Devices Monitor
InternalName : STIMON
OriginalFilename : STIMON.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:10 [aim.exe]
FilePath : C:\PROGRAM FILES\AIM95\
ProcessID : 4294823485
Threads : 17
Priority : Normal
FileSize : 60 KB
FileVersion : 5.5.3583
ProductVersion : 5.5.3583
Copyright : Copyright
CompanyName : America Online, Inc.
FileDescription : AOL Instant Messenger
InternalName : AIM
OriginalFilename : AIM.EXE
ProductName : AOL Instant Messenger
Created on : 03/25/2004 10:09:17 PM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 03/12/2004 7:22:16 PM

#:11 [wmiexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294753965
Threads : 3
Priority : Normal
FileSize : 16 KB
FileVersion : 5.00.1755.1
ProductVersion : 5.00.1755.1
Copyright : Copyright (C) Microsoft Corp. 1981-1998
CompanyName : Microsoft Corporation
FileDescription : WMI service exe housing
InternalName : wmiexe
OriginalFilename : wmiexe.exe
ProductName : Microsoft(R) Windows NT(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM

#:12 [ad-aware.exe]
FilePath : C:\PROGRAM FILES\LAVASOFT\AD-AWARE 6\
ProcessID : 4294630089
Threads : 2
Priority : Normal
FileSize : 668 KB
FileVersion : 6.0.1.181
ProductVersion : 6.0.0.0
Copyright : Copyright
CompanyName : Lavasoft Sweden
FileDescription : Ad-aware 6 core application
InternalName : Ad-aware.exe
OriginalFilename : Ad-aware.exe
ProductName : Lavasoft Ad-aware Plus
Created on : 03/30/2004 9:24:02 PM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 07/13/2003 5:00:20 AM

Memory scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 0
Objects found so far: 0


Started registry scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : SOFTWARE\180solutions


180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : SOFTWARE\180solutions\msbb


180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Uninstall\msbb


180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Uninstall\nCASE


Adtomi Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\adtomi


BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BookedSpace.Extension


BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BookedSpace.Extension.5


BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\BookedSpace


BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0019c3e2-dd48-4a6d-abcd-8d32436323d9}


BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : .b3ds


BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : b3ds_auto_file


BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BDESmartInstaller25.BDESmartInstaller25


BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BDESmartInstaller25.BDESmartInstaller25.1


BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{3EEC42B5-FB94-40D3-A588-BB54B383A7CB}


ClearSearch Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\CLRSCH


ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\ClipGenie


ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ClipGenie


ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\TrayNotifier\ClipGenie


ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\TrayNotifier\ClipGenie


DownloadWare Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\DownloadWare


DownloadWare Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : SOFTWARE\DownloadWare


Favoriteman Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : AppID\{B701A705-F828-11D4-A466-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{60F630A2-41EC-11D5-B558-00D0B77F0A6D}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{69FD62B1-0216-4C31-8D55-840ED86B7C8F}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{A80347E0-F757-11D4-A466-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbCoreSrv.HbCoreServices


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbCoreSrv.HbCoreServices.1


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbHostIE.HbBho.1


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HBInstIE.HbInstObj


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HBInstIE.HbInstObj.1


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbSrv.HbCoreServices


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbSrv.HbCoreServices.1


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbToolbar.HbToolbarCtl


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbToolbar.HbToolbarCtl.1


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{17719B53-FAD1-11D4-A466-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{17719B54-FAD1-11D4-A466-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{46417AFD-7A15-4ED1-B764-CB72CD4D904F}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{7E33BC81-0818-11D5-B50D-00D0B77F0A6D}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{8F59F897-6923-4B3B-8156-4E55D19DE99A}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{918E4B7A-4D80-43A4-83A7-39ADCC11841F}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A80347DF-F757-11D4-A466-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DA603411-0593-11D5-A46B-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DA603411-0593-11D5-A46B-10101B1B1111}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DA603411-0593-11D5-A46B-10101DDD1111}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F4132B7B-1576-41B6-ABD8-39C6C53047F7}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F64B26C1-07DE-11D5-B50D-00D0B77F0A6D}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F7A1BF21-1D7D-4F5F-A201-0CA35A5CD68F}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Explorer Bars\{BECAFC17-BAF9-11D4-B492-00D0B77F0A6D}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{60F63095-41EC-11D5-B558-00D0B77F0A6D}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{94BEB7A2-36B7-46DC-8AD1-81A8332409C0}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{A80347D3-F757-11D4-A466-00508B5BA2DF}


HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{B701A704-F828-11D4-A466-00508B5BA2DF}


NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{00000ef1-0786-4633-87c6-1aa7a44296da}


NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : f1.organizer


NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : f1.organizer.1


NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000EF1-0786-4633-87C6-1AA7A44296DA}


NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{ef100007-f409-426a-9e7c-cb211f2a9786}


NetworkEssentials Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\WebInstall


SahAgent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\VGroup


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{00041a26-7033-432c-94c7-6371de343822}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{49de8655-4d15-4536-b67c-2aa6c1106740}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{9368d063-44be-49b9-bd14-bb9663fd38fc}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{1EB48AA7-D3FE-4E4C-AC8E-B01594496AC0}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{42BD9965-303D-4CFB-AAE0-DCADCB791A55}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F5F0A448-2BCD-459E-8743-C39154EE1CA8}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{a8f92c35-530b-4907-922c-ce31d4b6b14a}


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webbho


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webbho.1


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webcommand


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webcommand.1


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.websearch


SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.websearch.1


StopPop Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{4534CD6B-59D6-43FD-864B-06A0D843444A}


Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : AppID\BookedSpace.DLL


Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : AppID\{0DC5CD7C-F653-4417-AA43-D457BE3A9622}


Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{0019C3E2-DD48-4A6D-ABCD-8D32436323D9}


Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{0DC5CD7C-F653-4417-AA43-D457BE3A9622}


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : bidll.bidllobj.1


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{000006b1-19b5-414a-849f-2a3c64ae6939}


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{000020DD-C72E-4113-AF77-DD56626C6C42}


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\twaintec


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TwaintecDll.TwaintecDllObj.1


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{690BCCB4-6B83-4203-AE77-038C116594EC}


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : vx2.vx2obj


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{0c097121-c5d6-47eb-841d-30bff71a71c4}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{7F23E6E5-0E79-4aee-B723-B1463805D5A9}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{8ECF83A0-1AC9-11D4-8501-00A0CC5D1F63}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{B9BA256A-075B-49ea-B9E2-7DBC2EF021D5}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{FA13A9FA-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{05EF74A5-E109-11D2-A566-444553540000}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{0E7AE465-EE8D-11D2-A566-444553540000}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{1113C0B6-5300-4D5D-B2D7-35C14B28341B}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{111D8B01-96C5-46DD-94D1-C6E8B1F69F44}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{16410859-886F-4579-BC1F-330A139D0F0F}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{35ED7DFB-A8ED-4216-A4BB-BC08C326EF08}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{399A8818-2000-436C-9A55-0016E5E3D227}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{3F44B498-8FD4-4A1E-852C-170156ED27C0}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{52889E01-CB46-11D2-96BC-00104B242E64}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{5C49CBD2-8ED7-439B-8668-32149F84A235}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{5DD15C3E-FC35-4E6F-B34C-E030D6439469}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{6E6CF8E5-D795-11D2-A566-444553540000}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{79884200-3ADE-11D3-AC39-00105A2057FA}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{810E95C2-F908-4E02-9B28-B92C3A778D0D}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{8DB2BC32-56E9-4349-B125-CB2561A06626}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A73F5102-3782-4945-BF97-889F9B6DC9A5}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{AA0C96F9-A994-42D7-9543-842CF85E1BA7}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{B57613B6-EF02-4D96-99C6-70C9A2014A14}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{BDB9B021-CAFF-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{BDB9B022-CAFF-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{C1DA7AB8-54FC-4971-9AFB-1BCB9AFC3AA2}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{C3A156D4-503F-4779-A673-657308D94FAF}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{D72AC8E7-F41D-11D2-A566-444553540000}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DE3E540A-F0F2-4761-99BE-AFC6DC427E30}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{EA6F254D-1A8C-4518-8FE0-E9B94FD134ED}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{EC914A5C-7C4B-4AC8-8C86-C10FF5C0D23D}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F10493C1-D0B6-11D2-A566-444553540000}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA3A-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA3E-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA40-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA44-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA46-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA50-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AAFA-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FECA7CFA-1083-4073-A98A-CF3389FCAF6A}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wtwebdriver


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\WildTangent


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{B162D478-EF46-4475-B1FE-216BDEDB7FAD}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{B7E20302-C22C-4AF2-9D75-C3EB6EEE9DD8}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{FA13AA2E-CA9B-11D2-9780-00104B242EA3}


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WDMHHost.WTHoster


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WDMHHost.WTHoster.1


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT.WTMultiplayer


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT.WTMultiplayer.1


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT3D.WT


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT3D.WT.1


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisReceiver


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisReceiver.1


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisSender


WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisSender.1


Favoriteman Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows
Value : Counter


Favoriteman Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows
Value : Server


Favoriteman Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows
Value : Object


HotBar Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
Value : {B195B3B3-8A05-11D3-97A4-0004ACA6948E}


SCBAR Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\URLSearchHooks
Value : {9368D063-44BE-49B9-BD14-BB9663FD38FC}


Windows Object recognized!
Type : RegData
Data :
Rootkey : HKEY_USERS
Object : .DEFAULT\Software\Microsoft\MediaPlayer\Player\Settings
Value : Client ID
Data :


Windows Object recognized!
Type : RegData
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\MediaPlayer\Player\Settings
Value : Client ID
Data :


Registry scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 150
Objects found so far: 150


Started deep registry scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Page.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistant.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURL.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Page.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Search_URL.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Default_Search_URL
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistant.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURL.searchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Bar.smartbotpro.net

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://server224.smartbotpro.net/7search/?new-hkcu"
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Bar
Data : "http://server224.smartbotpro.net/7search/?new-hkcu"

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Bar.smartbotpro.net

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://server224.smartbotpro.net/7search/?new-hklm"
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Bar
Data : "http://server224.smartbotpro.net/7search/?new-hklm"

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Pagedefault-homepage-network.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://default-homepage-network.com/start.cgi?new-hkcu"
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "http://default-homepage-network.com/start.cgi?new-hkcu"

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Pagedefault-homepage-network.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://default-homepage-network.com/start.cgi?new-hklm"
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "http://default-homepage-network.com/start.cgi?new-hklm"

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Pagesearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistantsearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURLsearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Pagesearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Search_URLsearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Default_Search_URL
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistantsearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURLsearchenhancement.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="


EGroup Dialer Object recognized!
Type : RegKey
Data : ELECTRONIC GROUP
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0


Favoriteman Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{B549456D-F5D0-4641-BCED-8648A0C13D83}


Favoriteman Object recognized!
Type : File
Data : browserhelper.dll
Object : c:\windows\
FileSize : 585 KB
Created on : 03/27/2004 8:58:40 AM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 03/27/2004 8:58:42 AM



Favoriteman Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B549456D-F5D0-4641-BCED-8648A0C13D83}


VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000020DD-C72E-4113-AF77-DD56626C6C42}


Deep registry scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 22
Objects found so far: 173


¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯


Deep scanning and examining files (CSmile
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

Winpup32 Object recognized!
Type : File
Data : pseriald.exe
Object : C:\WINDOWS\SYSTEM\
FileSize : 64 KB
Copyright :
  • Topic Stats
  • Top Replies
  • Link to this Topic
Type: Discussion • Score: 1 • Views: 618 • Replies: 2
No top replies

 
Monger
 
  1  
Reply Fri 9 Apr, 2004 10:30 am
Ad-Aware logs are long & mostly useless.

Please accompany any log files with plain English that describes what problem(s) you're having.

If information is needed to determine the source of the problem, you will probly be asked to post a logfile generated by HijackThis, which provides much more relevant info.
0 Replies
 
panzade
 
  1  
Reply Fri 9 Apr, 2004 11:26 am
Wow!!!
I think this qualifies for the longest topic post run off.
0 Replies
 
 

Related Topics

Clone of Micosoft Office - Question by Advocate
Do You Turn Off Your Computer at Night? - Discussion by Phoenix32890
The "Death" of the Computer Mouse - Discussion by Phoenix32890
Windows 10... - Discussion by Region Philbis
Surface Pro 3: What do you think? - Question by neologist
Windows 8 tips thread - Discussion by Wilso
GOOGLE CHROME - Question by Setanta
.Net and Firefox... - Discussion by gungasnake
Hacking a computer and remote access - Discussion by trying2learn
 
  1. Forums
  2. » favoriteman, clipgenie, sahagent, 180solutions + more. ARG.
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.03 seconds on 05/17/2024 at 01:26:58