i need some help. i updated my antivirus software, and ran that. cleaned up the computer, quarantined 10 different things.
what im pasting is the most recent scan with ad-aware that i have done. all 234 of these files have been quarantined. but, i have done this before, for all of the same stuff, so obviously there is something really wrong here.
and a stupid question: i had set up user names about a month ago. now there is one left (b/c i was afraid to delete it, didnt know if i could still go back on my computer if i did...i assume tho that deleting the last user name just means you dont need a password for windows anymore). im thinkin i should delete that right? files saved on the regular default user and the seperate user id are duplicates right? so this could go on forever? im probably 100% wrong, someone please explain it to me!
heres the scan: what do i do now?
Lavasoft Ad-aware Personal Build 6.181
Logfile created on :Friday, April 09, 2004 11:14:58 AM
Created with Ad-aware Personal, free for private use.
Using reference-file :01R277 29.03.2004
______________________________________________________
Ad-aware Settings
=========================
Set : Activate in-depth scan (Recommended)
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep scan registry
04-09-2004 11:14:58 AM - Scan started. (Smart mode)
Listing running processes
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
#:1 [kernel32.dll]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4279184585
Threads : 4
Priority : High
FileSize : 460 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1991-1999
CompanyName : Microsoft Corporation
FileDescription : Win32 Kernel core component
InternalName : KERNEL32
OriginalFilename : KERNEL32.DLL
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:2 [msgsrv32.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294956465
Threads : 1
Priority : Normal
FileSize : 11 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1992-1998
CompanyName : Microsoft Corporation
FileDescription : Windows 32-bit VxD Message Server
InternalName : MSGSRV32
OriginalFilename : MSGSRV32.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:3 [mprexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294961953
Threads : 1
Priority : Normal
FileSize : 28 KB
FileVersion : 4.10.1998
ProductVersion : 4.10.1998
Copyright : Copyright (C) Microsoft Corp. 1993-1998
CompanyName : Microsoft Corporation
FileDescription : WIN32 Network Interface Service Process
InternalName : MPREXE
OriginalFilename : MPREXE.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:4 [gwmdmmsg.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294935881
Threads : 2
Priority : Normal
FileSize : 98 KB
FileVersion : 3.3.12.1 07/21/2001 10:47:04
ProductVersion : 3.3.12.1 07/21/2001 10:47:04
Copyright : Copyright
CompanyName : GTW
FileDescription : Modem Messaging Applet
InternalName : smdmstat.exe
OriginalFilename : smdmstat.exe
ProductName : GTW Modem Messaging Applet
Created on : 08/16/2001 6:43:48 PM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 07/21/2001 5:47:06 PM
#:5 [mmtask.tsk]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294889001
Threads : 1
Priority : Normal
FileSize : 1 KB
FileVersion : 4.03.1998
ProductVersion : 4.03.1998
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Multimedia background task support module
InternalName : mmtask.tsk
OriginalFilename : mmtask.tsk
ProductName : Microsoft Windows
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:6 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294862881
Threads : 25
Priority : Normal
FileSize : 176 KB
FileVersion : 4.72.3110.1
ProductVersion : 4.72.3110.1
Copyright : Copyright (C) Microsoft Corp. 1981-1997
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
OriginalFilename : EXPLORER.EXE
ProductName : Microsoft(R) Windows NT(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:7 [systray.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294796581
Threads : 2
Priority : Normal
FileSize : 32 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1993-1998
CompanyName : Microsoft Corporation
FileDescription : System Tray Applet
InternalName : SYSTRAY
OriginalFilename : SYSTRAY.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:8 [navapw32.exe]
FilePath : C:\PROGRAM FILES\NORTON ANTIVIRUS\
ProcessID : 4294777569
Threads : 6
Priority : Normal
FileSize : 48 KB
FileVersion : 7.07.00.23
ProductVersion : 7.07.00.23
Copyright : Copyright (C) 2000 Symantec Corporation. All rights reserved.
CompanyName : Symantec Corporation
FileDescription : Norton AntiVirus Auto-Protect Agent
InternalName : NAVAPW32
OriginalFilename : NAVAPW32.DLL
ProductName : Norton AntiVirus
Created on : 04/27/2001 2:29:26 AM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 02/14/2001 1:00:00 PM
#:9 [stimon.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294779109
Threads : 3
Priority : Normal
FileSize : 112 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1996-1998
CompanyName : Microsoft Corporation
FileDescription : Still Image Devices Monitor
InternalName : STIMON
OriginalFilename : STIMON.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:10 [aim.exe]
FilePath : C:\PROGRAM FILES\AIM95\
ProcessID : 4294823485
Threads : 17
Priority : Normal
FileSize : 60 KB
FileVersion : 5.5.3583
ProductVersion : 5.5.3583
Copyright : Copyright
CompanyName : America Online, Inc.
FileDescription : AOL Instant Messenger
InternalName : AIM
OriginalFilename : AIM.EXE
ProductName : AOL Instant Messenger
Created on : 03/25/2004 10:09:17 PM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 03/12/2004 7:22:16 PM
#:11 [wmiexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294753965
Threads : 3
Priority : Normal
FileSize : 16 KB
FileVersion : 5.00.1755.1
ProductVersion : 5.00.1755.1
Copyright : Copyright (C) Microsoft Corp. 1981-1998
CompanyName : Microsoft Corporation
FileDescription : WMI service exe housing
InternalName : wmiexe
OriginalFilename : wmiexe.exe
ProductName : Microsoft(R) Windows NT(R) Operating System
Created on : 01/01/1601
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 04/24/1999 5:22:00 AM
#:12 [ad-aware.exe]
FilePath : C:\PROGRAM FILES\LAVASOFT\AD-AWARE 6\
ProcessID : 4294630089
Threads : 2
Priority : Normal
FileSize : 668 KB
FileVersion : 6.0.1.181
ProductVersion : 6.0.0.0
Copyright : Copyright
CompanyName : Lavasoft Sweden
FileDescription : Ad-aware 6 core application
InternalName : Ad-aware.exe
OriginalFilename : Ad-aware.exe
ProductName : Lavasoft Ad-aware Plus
Created on : 03/30/2004 9:24:02 PM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 07/13/2003 5:00:20 AM
Memory scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 0
Objects found so far: 0
Started registry scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : SOFTWARE\180solutions
180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : SOFTWARE\180solutions\msbb
180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Uninstall\msbb
180Solutions Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Uninstall\nCASE
Adtomi Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\adtomi
BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BookedSpace.Extension
BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BookedSpace.Extension.5
BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\BookedSpace
BookedSpace Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0019c3e2-dd48-4a6d-abcd-8d32436323d9}
BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : .b3ds
BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : b3ds_auto_file
BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BDESmartInstaller25.BDESmartInstaller25
BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : BDESmartInstaller25.BDESmartInstaller25.1
BrilliantDigital Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{3EEC42B5-FB94-40D3-A588-BB54B383A7CB}
ClearSearch Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\CLRSCH
ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\ClipGenie
ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ClipGenie
ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\TrayNotifier\ClipGenie
ClipGenie Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\TrayNotifier\ClipGenie
DownloadWare Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\DownloadWare
DownloadWare Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : SOFTWARE\DownloadWare
Favoriteman Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : AppID\{B701A705-F828-11D4-A466-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{60F630A2-41EC-11D5-B558-00D0B77F0A6D}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{69FD62B1-0216-4C31-8D55-840ED86B7C8F}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{A80347E0-F757-11D4-A466-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbCoreSrv.HbCoreServices
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbCoreSrv.HbCoreServices.1
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbHostIE.HbBho.1
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HBInstIE.HbInstObj
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HBInstIE.HbInstObj.1
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbSrv.HbCoreServices
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbSrv.HbCoreServices.1
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbToolbar.HbToolbarCtl
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : HbToolbar.HbToolbarCtl.1
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{17719B53-FAD1-11D4-A466-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{17719B54-FAD1-11D4-A466-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{46417AFD-7A15-4ED1-B764-CB72CD4D904F}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{7E33BC81-0818-11D5-B50D-00D0B77F0A6D}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{8F59F897-6923-4B3B-8156-4E55D19DE99A}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{918E4B7A-4D80-43A4-83A7-39ADCC11841F}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A80347DF-F757-11D4-A466-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DA603411-0593-11D5-A46B-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DA603411-0593-11D5-A46B-10101B1B1111}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DA603411-0593-11D5-A46B-10101DDD1111}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F4132B7B-1576-41B6-ABD8-39C6C53047F7}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F64B26C1-07DE-11D5-B50D-00D0B77F0A6D}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F7A1BF21-1D7D-4F5F-A201-0CA35A5CD68F}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Explorer Bars\{BECAFC17-BAF9-11D4-B492-00D0B77F0A6D}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{60F63095-41EC-11D5-B558-00D0B77F0A6D}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{94BEB7A2-36B7-46DC-8AD1-81A8332409C0}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{A80347D3-F757-11D4-A466-00508B5BA2DF}
HotBar Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{B701A704-F828-11D4-A466-00508B5BA2DF}
NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{00000ef1-0786-4633-87c6-1aa7a44296da}
NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : f1.organizer
NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : f1.organizer.1
NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000EF1-0786-4633-87C6-1AA7A44296DA}
NetPal Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{ef100007-f409-426a-9e7c-cb211f2a9786}
NetworkEssentials Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\WebInstall
SahAgent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\VGroup
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{00041a26-7033-432c-94c7-6371de343822}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{49de8655-4d15-4536-b67c-2aa6c1106740}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{9368d063-44be-49b9-bd14-bb9663fd38fc}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{1EB48AA7-D3FE-4E4C-AC8E-B01594496AC0}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{42BD9965-303D-4CFB-AAE0-DCADCB791A55}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F5F0A448-2BCD-459E-8743-C39154EE1CA8}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{a8f92c35-530b-4907-922c-ce31d4b6b14a}
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webbho
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webbho.1
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webcommand
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.webcommand.1
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.websearch
SCBAR Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : webcom.websearch.1
StopPop Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{4534CD6B-59D6-43FD-864B-06A0D843444A}
Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : AppID\BookedSpace.DLL
Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : AppID\{0DC5CD7C-F653-4417-AA43-D457BE3A9622}
Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{0019C3E2-DD48-4A6D-ABCD-8D32436323D9}
Virtumundo Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{0DC5CD7C-F653-4417-AA43-D457BE3A9622}
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : bidll.bidllobj.1
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{000006b1-19b5-414a-849f-2a3c64ae6939}
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{000020DD-C72E-4113-AF77-DD56626C6C42}
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\twaintec
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TwaintecDll.TwaintecDllObj.1
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{690BCCB4-6B83-4203-AE77-038C116594EC}
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : vx2.vx2obj
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{0c097121-c5d6-47eb-841d-30bff71a71c4}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{7F23E6E5-0E79-4aee-B723-B1463805D5A9}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{8ECF83A0-1AC9-11D4-8501-00A0CC5D1F63}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{B9BA256A-075B-49ea-B9E2-7DBC2EF021D5}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{FA13A9FA-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{05EF74A5-E109-11D2-A566-444553540000}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{0E7AE465-EE8D-11D2-A566-444553540000}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{1113C0B6-5300-4D5D-B2D7-35C14B28341B}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{111D8B01-96C5-46DD-94D1-C6E8B1F69F44}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{16410859-886F-4579-BC1F-330A139D0F0F}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{35ED7DFB-A8ED-4216-A4BB-BC08C326EF08}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{399A8818-2000-436C-9A55-0016E5E3D227}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{3F44B498-8FD4-4A1E-852C-170156ED27C0}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{52889E01-CB46-11D2-96BC-00104B242E64}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{5C49CBD2-8ED7-439B-8668-32149F84A235}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{5DD15C3E-FC35-4E6F-B34C-E030D6439469}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{6E6CF8E5-D795-11D2-A566-444553540000}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{79884200-3ADE-11D3-AC39-00105A2057FA}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{810E95C2-F908-4E02-9B28-B92C3A778D0D}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{8DB2BC32-56E9-4349-B125-CB2561A06626}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A73F5102-3782-4945-BF97-889F9B6DC9A5}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{AA0C96F9-A994-42D7-9543-842CF85E1BA7}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{B57613B6-EF02-4D96-99C6-70C9A2014A14}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{BDB9B021-CAFF-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{BDB9B022-CAFF-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{C1DA7AB8-54FC-4971-9AFB-1BCB9AFC3AA2}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{C3A156D4-503F-4779-A673-657308D94FAF}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{D72AC8E7-F41D-11D2-A566-444553540000}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{DE3E540A-F0F2-4761-99BE-AFC6DC427E30}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{EA6F254D-1A8C-4518-8FE0-E9B94FD134ED}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{EC914A5C-7C4B-4AC8-8C86-C10FF5C0D23D}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{F10493C1-D0B6-11D2-A566-444553540000}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA3A-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA3E-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA40-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA44-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA46-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AA50-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FA13AAFA-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{FECA7CFA-1083-4073-A98A-CF3389FCAF6A}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wtwebdriver
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\WildTangent
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{B162D478-EF46-4475-B1FE-216BDEDB7FAD}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{B7E20302-C22C-4AF2-9D75-C3EB6EEE9DD8}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{FA13AA2E-CA9B-11D2-9780-00104B242EA3}
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WDMHHost.WTHoster
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WDMHHost.WTHoster.1
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT.WTMultiplayer
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT.WTMultiplayer.1
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT3D.WT
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WT3D.WT.1
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisReceiver
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisReceiver.1
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisSender
WildTangent Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WTVis.WTVisSender.1
Favoriteman Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows
Value : Counter
Favoriteman Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows
Value : Server
Favoriteman Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows
Value : Object
HotBar Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
Value : {B195B3B3-8A05-11D3-97A4-0004ACA6948E}
SCBAR Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\URLSearchHooks
Value : {9368D063-44BE-49B9-BD14-BB9663FD38FC}
Windows Object recognized!
Type : RegData
Data :
Rootkey : HKEY_USERS
Object : .DEFAULT\Software\Microsoft\MediaPlayer\Player\Settings
Value : Client ID
Data :
Windows Object recognized!
Type : RegData
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\MediaPlayer\Player\Settings
Value : Client ID
Data :
Registry scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 150
Objects found so far: 150
Started deep registry scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Page.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistant.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURL.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Page.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Search_URL.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Default_Search_URL
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistant.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURL.searchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Bar.smartbotpro.net
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://server224.smartbotpro.net/7search/?new-hkcu"
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Bar
Data : "http://server224.smartbotpro.net/7search/?new-hkcu"
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Bar.smartbotpro.net
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://server224.smartbotpro.net/7search/?new-hklm"
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Bar
Data : "http://server224.smartbotpro.net/7search/?new-hklm"
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Pagedefault-homepage-network.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://default-homepage-network.com/start.cgi?new-hkcu"
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "http://default-homepage-network.com/start.cgi?new-hkcu"
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Pagedefault-homepage-network.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://default-homepage-network.com/start.cgi?new-hklm"
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "http://default-homepage-network.com/start.cgi?new-hklm"
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Pagesearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistantsearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURLsearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Pagesearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Search Page
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Search_URLsearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Default_Search_URL
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistantsearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Search
Value : SearchAssistant
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURLsearchenhancement.com
Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\SearchURL
Value :
Data : "http://search.searchenhancement.com/nph-enhanced.cgi?affid=sesm&sstring="
EGroup Dialer Object recognized!
Type : RegKey
Data : ELECTRONIC GROUP
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0
Favoriteman Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{B549456D-F5D0-4641-BCED-8648A0C13D83}
Favoriteman Object recognized!
Type : File
Data : browserhelper.dll
Object : c:\windows\
FileSize : 585 KB
Created on : 03/27/2004 8:58:40 AM
Last accessed : 04/09/2004 7:00:00 AM
Last modified : 03/27/2004 8:58:42 AM
Favoriteman Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B549456D-F5D0-4641-BCED-8648A0C13D83}
VX2.BetterInternet Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000020DD-C72E-4113-AF77-DD56626C6C42}
Deep registry scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 22
Objects found so far: 173
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
Deep scanning and examining files (C
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
Winpup32 Object recognized!
Type : File
Data : pseriald.exe
Object : C:\WINDOWS\SYSTEM\
FileSize : 64 KB
Copyright :