1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

180 search & zango infection

Discussion in 'Virus & Other Malware Removal' started by hank1966, Jul 23, 2006.

Thread Status:
Not open for further replies.
Advertisement
  1. hank1966

    hank1966 Thread Starter

    Joined:
    Jul 8, 2006
    Messages:
    93
    i have got 180 search and zago please help

    here is my hjtLogfile of HijackThis v1.99.1
    Scan saved at 20:50:19, on 23/07/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\Program Files\ewido anti-spyware 4.0\guard.exe
    C:\Program Files\CA\eTrust Antivirus\InoRpc.exe
    C:\Program Files\CA\eTrust Antivirus\InoRT.exe
    C:\Program Files\CA\eTrust Antivirus\InoTask.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\VTTimer.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Thomson\SpeedTouch USB\Dragdiag.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\PROGRA~1\CA\ETRUST~1\realmon.exe
    C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    C:\Program Files\Lexmark 4300 Series\lxcemon.exe
    C:\Program Files\Lexmark 4300 Series\ezprint.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\ewido anti-spyware 4.0\ewido.exe
    C:\Program Files\Picasa2\PicasaMediaDetector.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\WINDOWS\system32\lxcecoms.exe
    C:\Program Files\Yahoo!\Messenger\YPager.exe
    C:\Program Files\LimeWire\LimeWire.exe
    C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
    C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Webroot\Spy Sweeper\SSU.EXE
    C:\Program Files\HijackThis 1.99.1\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.iqon.ie/
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - (no file)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [SpeedTouch USB Diagnostics] "C:\Program Files\Thomson\SpeedTouch USB\Dragdiag.exe" /icon
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [MCtrlA5-0.exe] "C:\Program Files\PixAlert\PixAlert @Home 2.0\MCtrlA5-0.exe"
    O4 - HKLM\..\Run: [AntivirusRegistration] "C:\Program Files\CA\Etrust Antivirus\Register.exe"
    O4 - HKLM\..\Run: [Realtime Monitor] "C:\PROGRA~1\CA\ETRUST~1\realmon.exe" -s
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe"
    O4 - HKLM\..\Run: [LXCECATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCEtime.dll,[email protected]
    O4 - HKLM\..\Run: [lxcemon.exe] "C:\Program Files\Lexmark 4300 Series\lxcemon.exe"
    O4 - HKLM\..\Run: [EzPrint] "C:\Program Files\Lexmark 4300 Series\ezprint.exe"
    O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
    O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [!ewido] "C:\Program Files\ewido anti-spyware 4.0\ewido.exe" /minimized
    O4 - HKLM\..\Run: [Picasa Media Detector] "C:\Program Files\Picasa2\PicasaMediaDetector.exe"
    O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintray
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\ypager.exe" -quiet
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
    O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
    O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
    O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
    O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\PROGRA~1\Yahoo!\Common\yhexbmesuk.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\PROGRA~1\Yahoo!\Common\yhexbmesuk.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C0AE0F35-2B1C-481B-BBC0-62B1627F6344}: NameServer = 212.158.248.6 83.146.21.5
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
    O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: eTrust Antivirus RPC Server (InoRPC) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust Antivirus\InoRpc.exe
    O23 - Service: eTrust Antivirus Realtime Server (InoRT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust Antivirus\InoRT.exe
    O23 - Service: eTrust Antivirus Job Server (InoTask) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust Antivirus\InoTask.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: lxby_device - Lexmark International, Inc. - C:\WINDOWS\system32\lxbycoms.exe
    O23 - Service: lxce_device - Lexmark International, Inc. - C:\WINDOWS\system32\lxcecoms.exe
    O23 - Service: TuneUp WinStyler Theme Service (TUWinStylerThemeSvc) - TuneUp Software GmbH - C:\Program Files\TuneUp Utilities 2006\WinStylerThemeSvc.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
     
  2. dvk01

    dvk01 Moderator Malware Specialist

    Joined:
    Dec 14, 2002
    Messages:
    56,223
    First Name:
    Derek
    no sign of it in the HJT log & spysweeper & Ewido normally do a pretty good job of getting rid of it

    what is telling you that you have it and where
     
  3. hank1966

    hank1966 Thread Starter

    Joined:
    Jul 8, 2006
    Messages:
    93
    spy sweeper is telling me and a thing called statcounter
     
  4. dvk01

    dvk01 Moderator Malware Specialist

    Joined:
    Dec 14, 2002
    Messages:
    56,223
    First Name:
    Derek
    post teh spysweeper session log

    on the options page press view session log, press save & post taht log back here please
     
  5. hank1966

    hank1966 Thread Starter

    Joined:
    Jul 8, 2006
    Messages:
    93
    sorry dvk01 but how do i do that please

    thans hank
     
  6. dvk01

    dvk01 Moderator Malware Specialist

    Joined:
    Dec 14, 2002
    Messages:
    56,223
    First Name:
    Derek
    open spysweeper and select the options button
    when the options page opens press view session log, press save & copy & post that log back here please
     
  7. hank1966

    hank1966 Thread Starter

    Joined:
    Jul 8, 2006
    Messages:
    93
    thanks here it is
     
  8. hank1966

    hank1966 Thread Starter

    Joined:
    Jul 8, 2006
    Messages:
    93
    21:13: None
    21:13: Traces Found: 0
    21:13: Memory Sweep Complete, Elapsed Time: 00:02:24
    21:13: Sweep Canceled
    21:11: Starting Memory Sweep
    21:11: Sweep initiated using definitions version 724
    21:11: Spy Sweeper 5.0.5.1286 started
    21:11: | Start of Session, 23 July 2006 |
    ********
    21:11: | End of Session, 23 July 2006 |
    21:11: None
    21:11: Traces Found: 0
    21:11: Memory Sweep Complete, Elapsed Time: 00:02:14
    21:11: Sweep Canceled
    21:08: Starting Memory Sweep
    21:08: Sweep initiated using definitions version 724
    21:08: Spy Sweeper 5.0.5.1286 started
    21:08: | Start of Session, 23 July 2006 |
    ********
    21:08: | End of Session, 23 July 2006 |
    21:05: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.google.com/ Error: Failed to set data for 'Start Page'
    21:05: IE Hijack Shield: Resetting Home Page value.
    21:04: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.google.com/ Error: Failed to set data for 'Start Page'
    21:04: IE Hijack Shield: Resetting Home Page value.
    20:49: Removal process completed. Elapsed time 00:00:04
    20:49: Quarantining All Traces: statcounter cookie
    20:49: Removal process initiated
    20:46: Traces Found: 1
    20:46: Full Sweep has completed. Elapsed time 00:11:35
    20:46: File Sweep Complete, Elapsed Time: 00:06:15
    20:46: Warning: Failed to access drive I:
    20:46: Warning: Failed to access drive H:
    20:46: Warning: Failed to access drive G:
    20:46: Warning: Failed to access drive F:
    20:46: Warning: Failed to access drive E:
    20:46: Warning: Failed to access drive D:
    20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\local settings\temporary internet files\content.ie5\6d6lxzyj\server[2].gif". The operation completed successfully
    20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\incomplete\t-15872-ewido_serials.exe". The operation completed successfully
    20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt". The operation completed successfully
    20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\incomplete\t-186040448-my friends hot mom - mrs. raquel & mrs.jean (age 4240).mpg". The operation completed successfully
    20:40: Starting File Sweep
    20:40: Cookie Sweep Complete, Elapsed Time: 00:00:01
    20:40: c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt (ID = 3447)
    20:40: Found Spy Cookie: statcounter cookie
    20:40: Starting Cookie Sweep
    20:40: Registry Sweep Complete, Elapsed Time:00:00:49
    20:39: Starting Registry Sweep
    20:39: Memory Sweep Complete, Elapsed Time: 00:04:19
    20:34: Starting Memory Sweep
    20:34: Sweep initiated using definitions version 724
    20:34: Spy Sweeper 5.0.5.1286 started
    20:34: | Start of Session, 23 July 2006 |
    ********
    20:34: | End of Session, 23 July 2006 |
    20:26: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:26: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:26: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:26: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:24: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:24: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.google.comme Error: Failed to set data for 'Start Page'
    20:23: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:23: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
    20:20: Removal process completed. Elapsed time 00:01:33
    20:19: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST358.tmp". Reason: The system cannot find the file specified
    20:19: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
    20:19: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST358.tmp". Reason: The system cannot find the file specified
    20:19: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
    20:19: Quarantining All Traces: statcounter cookie
    20:19: Quarantining All Traces: webtrends cookie
    20:19: Quarantining All Traces: falkag cookie
    20:19: Quarantining All Traces: websponsors cookie
    20:19: Quarantining All Traces: tribalfusion cookie
    20:19: Quarantining All Traces: serving-sys cookie
    20:19: Quarantining All Traces: realmedia cookie
    20:19: Quarantining All Traces: questionmarket cookie
    20:19: Quarantining All Traces: fastclick cookie
    20:19: Quarantining All Traces: zedo cookie
    20:19: Quarantining All Traces: burstnet cookie
    20:19: Quarantining All Traces: a cookie
    20:19: Quarantining All Traces: atlas dmt cookie
    20:19: Quarantining All Traces: advertising cookie
    20:19: Quarantining All Traces: adrevolver cookie
    20:19: Quarantining All Traces: yieldmanager cookie
    20:19: Quarantining All Traces: 2o7.net cookie
    20:19: Quarantining All Traces: starware toolbar
    20:19: Quarantining All Traces: 180search assistant/zango
    20:19: Removal process initiated
    20:18: Traces Found: 23
    20:18: Full Sweep has completed. Elapsed time 00:11:40
    20:18: File Sweep Complete, Elapsed Time: 00:06:40
    20:18: Warning: Failed to access drive I:
    20:18: Warning: Failed to access drive H:
    20:18: Warning: Failed to access drive G:
    20:18: Warning: Failed to access drive F:
    20:18: Warning: Failed to access drive E:
    20:18: Warning: Failed to access drive D:
    20:11: Starting File Sweep
    20:11: Cookie Sweep Complete, Elapsed Time: 00:00:01
    20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][2].txt (ID = 3447)
    20:11: Found Spy Cookie: statcounter cookie
    20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt (ID = 3235)
    20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][2].txt (ID = 3669)
    20:11: Found Spy Cookie: webtrends cookie
    20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][2].txt (ID = 2650)
    20:11: Found Spy Cookie: falkag cookie
    20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt (ID = 3665)
    20:11: Found Spy Cookie: websponsors cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 3762)
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 2337)
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3589)
    20:11: Found Spy Cookie: tribalfusion cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 3343)
    20:11: Found Spy Cookie: serving-sys cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 3235)
    20:11: Found Spy Cookie: realmedia cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3217)
    20:11: Found Spy Cookie: questionmarket cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 1958)
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2651)
    20:11: Found Spy Cookie: fastclick cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3763)
    20:11: Found Spy Cookie: zedo cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2336)
    20:11: Found Spy Cookie: burstnet cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 2027)
    20:11: Found Spy Cookie: a cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2253)
    20:11: Found Spy Cookie: atlas dmt cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2175)
    20:11: Found Spy Cookie: advertising cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 2088)
    20:11: Found Spy Cookie: adrevolver cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3751)
    20:11: Found Spy Cookie: yieldmanager cookie
    20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 1957)
    20:11: Found Spy Cookie: 2o7.net cookie
    20:11: Starting Cookie Sweep
    20:11: Registry Sweep Complete, Elapsed Time:00:00:38
    20:11: HKU\WRSS_Profile_S-1-5-21-352208718-2397271575-3027016645-1008\software\zango\ (ID = 147919)
    20:11: Found Adware: 180search assistant/zango
    20:11: HKU\WRSS_Profile_S-1-5-21-352208718-2397271575-3027016645-1008\software\starware\ (ID = 142866)
    20:11: Found Adware: starware toolbar
    20:11: Starting Registry Sweep
    20:11: Memory Sweep Complete, Elapsed Time: 00:04:06
    20:06: Starting Memory Sweep
    20:06: Sweep initiated using definitions version 724
    20:06: Spy Sweeper 5.0.5.1286 started
    20:06: | Start of Session, 23 July 2006 |
    ********
    20:06: | End of Session, 23 July 2006 |
    20:06: Your spyware definitions have been updated.
    Operation: File Access
    Target:
    Source: C:\PROGRAM FILES\CA\ETRUST ANTIVIRUS\INORT.EXE
    20:05: Tamper Detection
    Keylogger Shield: On
    BHO Shield: On
    IE Security Shield: On
    Alternate Data Stream (ADS) Execution Shield: On
    Startup Shield: On
    Common Ad Sites Shield: Off
    Hosts File Shield: On
    Spy Communication Shield: On
    ActiveX Shield: On
    Windows Messenger Service Shield: On
    IE Favorites Shield: On
    Spy Installation Shield: On
    Memory Shield: On
    IE Hijack Shield: On
    IE Tracking Cookies Shield: Off
    20:04: Shield States
    20:04: Spyware Definitions: 691
    20:04: Spy Sweeper 5.0.5.1286 started
    20:04: Spy Sweeper 5.0.5.1286 started
    20:04: | Start of Session, 23 July 2006 |
    ********
     
  9. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/485695

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice