1:25 PM: Removal process completed. Elapsed time 00:04:30
1:23 PM: Quarantining All Traces: zedo cookie
1:23 PM: Quarantining All Traces: adserver cookie
1:23 PM: Quarantining All Traces: burstbeacon cookie
1:23 PM: Quarantining All Traces: tripod cookie
1:23 PM: Quarantining All Traces: tribalfusion cookie
1:23 PM: Quarantining All Traces: trafficmp cookie
1:23 PM: Quarantining All Traces: tacoda cookie
1:23 PM: Quarantining All Traces: statcounter cookie
1:23 PM: Quarantining All Traces: realmedia cookie
1:23 PM: Quarantining All Traces: questionmarket cookie
1:23 PM: Quarantining All Traces: partypoker cookie
1:23 PM: Quarantining All Traces: mediaplex cookie
1:23 PM: Quarantining All Traces: fastclick cookie
1:23 PM: Quarantining All Traces: sextracker cookie
1:23 PM: Quarantining All Traces: hitslink cookie
1:23 PM: Quarantining All Traces: ccbill cookie
1:23 PM: Quarantining All Traces: casalemedia cookie
1:23 PM: Quarantining All Traces: burstnet cookie
1:23 PM: Quarantining All Traces: bluestreak cookie
1:23 PM: Quarantining All Traces: atlas dmt cookie
1:23 PM: Quarantining All Traces: ask cookie
1:23 PM: Quarantining All Traces: advertising cookie
1:23 PM: Quarantining All Traces: adtech cookie
1:23 PM: Quarantining All Traces: pointroll cookie
1:23 PM: Quarantining All Traces: addynamix cookie
1:23 PM: Quarantining All Traces: adrevolver cookie
1:23 PM: Quarantining All Traces: specificclick.com cookie
1:23 PM: Quarantining All Traces: yieldmanager cookie
1:23 PM: Quarantining All Traces: about cookie
1:23 PM: Quarantining All Traces: websponsors cookie
1:23 PM: Quarantining All Traces: 2o7.net cookie
1:23 PM: Quarantining All Traces: security toolbar
1:23 PM: Quarantining All Traces: networkessentials
1:23 PM: Quarantining All Traces: instafinder
1:23 PM: Quarantining All Traces: topsearch
1:22 PM: Quarantining All Traces: rx toolbar
1:22 PM: Quarantining All Traces: bullguard popup ad
1:22 PM: Quarantining All Traces: mediapipe
1:22 PM: Quarantining All Traces: starware cursorcafe
1:22 PM: Quarantining All Traces: comet systems
1:22 PM: Quarantining All Traces: altnet
1:22 PM: Quarantining All Traces: starware toolbar
1:22 PM: Quarantining All Traces: p2pnetwork
1:21 PM: Quarantining All Traces: security2k hijacker
1:21 PM: Removal process initiated
1:16 PM: Traces Found: 187
1:16 PM: Full Sweep has completed. Elapsed time 00:18:56
1:16 PM: File Sweep Complete, Elapsed Time: 00:15:24
1:13 PM: C:\WINDOWS\Temp\Altnet\pmexe.cab (ID = 49861)
1:13 PM: C:\WINDOWS\Temp\Altnet\dmfiles.cab (ID = 49865)
1:13 PM: Warning: Could not find a spy with ID "0"
1:13 PM: C:\WINDOWS\Temp\Altnet\pmfiles.cab (ID = 49859)
1:12 PM: Warning: Failed to access drive I:
1:12 PM: Warning: Failed to access drive H:
1:12 PM: Warning: Failed to access drive G:
1:12 PM: Warning: Failed to access drive F:
1:12 PM: Warning: Failed to access drive E:
1:10 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP196\A0010960.bat (ID = 202688)
1:10 PM: Found Adware: security toolbar
1:10 PM: C:\Program Files\DownloadManager\DownloadManager.ini (ID = 162695)
1:10 PM: c:\windows\downloaded program files\cursorcafe.inf (ID = 137348)
1:09 PM: Warning: PerformFileOffsetMatch Failed to check file "c:\windows\system32\hp100.tmp.vir". "c:\windows\system32\hp100.tmp.vir": File not found
1:08 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP194\A0010747.exe (ID = 63654)
1:08 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007375.dll (ID = 165630)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007395.dll (ID = 243450)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007394.dll (ID = 243437)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007328.exe (ID = 49862)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007334.exe (ID = 277546)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007345.dll (ID = 137347)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007346.dll (ID = 137343)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007326.dll (ID = 243437)
1:07 PM: C:\WINDOWS\Temp\BullGuard\bulldownload.exe (ID = 52017)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007331.Manifest (ID = 49859)
1:07 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007383.exe (ID = 49862)
1:07 PM: C:\WINDOWS\Temp\Altnet\pmexe.cab (ID = 49854)
1:07 PM: C:\WINDOWS\Temp\Altnet\admdloader.dll (ID = 49786)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007379.exe (ID = 49793)
1:06 PM: C:\WINDOWS\Temp\Altnet\adm.exe (ID = 111765)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007316.dll (ID = 250397)
1:06 PM: C:\WINDOWS\Temp\Altnet\adm4.dll (ID = 49779)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007372.dll (ID = 165627)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007374.exe (ID = 111765)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007378.dll (ID = 165633)
1:06 PM: C:\WINDOWS\Temp\Altnet\dmfiles.cab (ID = 49818)
1:06 PM: C:\WINDOWS\Temp\Altnet\dminstall7.cab (ID = 49829)
1:06 PM: C:\WINDOWS\Temp\Altnet\pminstall.cab (ID = 49857)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007399.exe (ID = 243448)
1:06 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007405.exe (ID = 162703)
1:06 PM: C:\WINDOWS\Temp\Altnet\pmfiles.cab (ID = 49856)
1:06 PM: C:\WINDOWS\Temp\Altnet\admprog.dll (ID = 49790)
1:05 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007329.exe (ID = 49803)
1:05 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007366.Manifest (ID = 49859)
1:05 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007380.exe (ID = 49803)
1:05 PM: C:\Program Files\DownloadManager\insdl.dll (ID = 71040)
1:05 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007367.dll (ID = 49878)
1:05 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007344.exe (ID = 137345)
1:05 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007373.dll (ID = 165628)
1:04 PM: C:\WINDOWS\Temp\Altnet\adm25.dll (ID = 49782)
1:04 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007376.dll (ID = 165631)
1:04 PM: C:\WINDOWS\Temp\Altnet\Setup.exe (ID = 49875)
1:03 PM: C:\WINDOWS\Temp\Altnet\DMinfo3.cab (ID = 49824)
1:03 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007347.exe (ID = 137970)
1:03 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007369.exe (ID = 165635)
1:03 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007377.dll (ID = 165632)
1:03 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007332.dll (ID = 49878)
1:03 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP137\A0007324.exe (ID = 63654)
1:03 PM: C:\Program Files\MediaPipe\register.dll (ID = 71040)
1:03 PM: Found Adware: networkessentials
1:03 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP196\A0010972.dll (ID = 165717)
1:03 PM: Found Adware: instafinder
1:02 PM: C:\WINDOWS\Temp\Altnet\admfdi.dll (ID = 49789)
1:02 PM: C:\WINDOWS\Temp\Altnet\admdata.dll (ID = 49784)
1:02 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007381.dll (ID = 165637)
1:02 PM: C:\System Volume Information\_restore{f845e3db-f751-4be4-a620-64f2ca1bfb5f}\RP138\A0007357.dll (ID = 250397)
1:02 PM: Found Adware: topsearch
1:01 PM: C:\Program Files\RXToolBar (ID = 2147490879)
1:01 PM: Found Adware: rx toolbar
1:01 PM: C:\WINDOWS\Temp\Altnet (18 subtraces) (ID = 2147485861)
1:01 PM: C:\WINDOWS\Temp\BullGuard (1 subtraces) (ID = 2147490887)
1:01 PM: Found Adware: bullguard popup ad
1:01 PM: C:\Program Files\MediaPipe (4 subtraces) (ID = 2147497176)
1:01 PM: C:\My AccessMedia (1 subtraces) (ID = 2147498114)
1:01 PM: Starting File Sweep
1:01 PM: Cookie Sweep Complete, Elapsed Time: 00:00:01
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3762)
1:01 PM: Found Spy Cookie: zedo cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2142)
1:01 PM: Found Spy Cookie: adserver cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2337)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2335)
1:01 PM: Found Spy Cookie: burstbeacon cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3591)
1:01 PM: Found Spy Cookie: tripod cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3589)
1:01 PM: Found Spy Cookie: tribalfusion cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3581)
1:01 PM: Found Spy Cookie: trafficmp cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 6444)
1:01 PM: Found Spy Cookie: tacoda cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3447)
1:01 PM: Found Spy Cookie: statcounter cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3361)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3235)
1:01 PM: Found Spy Cookie: realmedia cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3217)
1:01 PM: Found Spy Cookie: questionmarket cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3111)
1:01 PM: Found Spy Cookie: partypoker cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 1958)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 1958)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 6442)
1:01 PM: Found Spy Cookie: mediaplex cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2652)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2089)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2651)
1:01 PM: Found Spy Cookie: fastclick cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2038)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 1958)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3362)
1:01 PM: Found Spy Cookie: sextracker cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2790)
1:01 PM: Found Spy Cookie: hitslink cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2369)
1:01 PM: Found Spy Cookie: ccbill cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2354)
1:01 PM: Found Spy Cookie: casalemedia cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2336)
1:01 PM: Found Spy Cookie: burstnet cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2314)
1:01 PM: Found Spy Cookie: bluestreak cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2253)
1:01 PM: Found Spy Cookie: atlas dmt cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2245)
1:01 PM: Found Spy Cookie: ask cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2175)
1:01 PM: Found Spy Cookie: advertising cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2155)
1:01 PM: Found Spy Cookie: adtech cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3148)
1:01 PM: Found Spy Cookie: pointroll cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2062)
1:01 PM: Found Spy Cookie: addynamix cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 2088)
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2088)
1:01 PM: Found Spy Cookie: adrevolver cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3400)
1:01 PM: Found Spy Cookie: specificclick.com cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 3751)
1:01 PM: Found Spy Cookie: yieldmanager cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 2037)
1:01 PM: Found Spy Cookie: about cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][2].txt (ID = 3665)
1:01 PM: Found Spy Cookie: websponsors cookie
1:01 PM: c:\documents and settings\owner\cookies\
[email protected][1].txt (ID = 1957)
1:01 PM: Found Spy Cookie: 2o7.net cookie
1:01 PM: Starting Cookie Sweep
1:01 PM: Registry Sweep Complete, Elapsed Time:00:00:31
1:01 PM: HKU\S-1-5-21-3260517127-4111241513-634508805-1003\software\microsoft\internet explorer\toolbar\webbrowser\ || {d49e9d35-254c-4c6a-9d17-95018d228ff5} (ID = 142862)
1:01 PM: HKU\S-1-5-21-3260517127-4111241513-634508805-1003\software\microsoft\internet explorer\toolbar\webbrowser\ || {2d51d869-c36b-42bd-ae68-0a81bc771fa5} (ID = 142860)
1:01 PM: Found Adware: starware toolbar
1:01 PM: HKLM\software\microsoft\code store database\distribution units\{ef98af7b-1f54-4079-91bc-3996deaba45a}\ (ID = 1022713)
1:01 PM: HKLM\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\ || c:\program files\p2pnetworks\p2pnetworks.exe (ID = 871570)
1:01 PM: HKLM\software\microsoft\windows\currentversion\uninstall\mediapipe\ (ID = 867153)
1:01 PM: HKLM\software\microsoft\windows\currentversion\run\ || mediapipe p2p loader (ID = 867145)
1:01 PM: HKLM\software\classes\typelib\{ccebbeb5-d011-41b5-9f92-01f88a38dc0d}\ (ID = 867115)
1:01 PM: HKLM\software\classes\typelib\{ab3b59a5-8bb4-46ab-a878-dfdb237d5bd5}\ (ID = 867095)
1:01 PM: HKLM\software\classes\typelib\{555fb512-9f3b-4359-9d2a-3c10e750ce5e}\ (ID = 867075)
1:01 PM: HKLM\software\classes\typelib\{45c2360e-bfdf-439b-a3ea-65e8383f9353}\ (ID = 867065)
1:01 PM: HKLM\software\classes\clsid\{b3e19860-0cd5-4991-a066-4fca2704de59}\ (ID = 867026)
1:01 PM: HKLM\software\classes\clsid\{48bb16aa-3f6c-4b28-9884-1fcec1c5da65}\ (ID = 867002)
1:01 PM: HKLM\software\classes\clsid\{1e9adaf2-4eda-4074-96ce-c9972e675c88}\ (ID = 866985)
1:01 PM: HKLM\software\classes\appid\{ccebbeb5-d011-41b5-9f92-01f88a38dc0d}\ (ID = 866983)
1:01 PM: HKLM\software\classes\appid\{99c4f93d-42a7-478d-8746-4afb6c10bc26}\ (ID = 866981)
1:01 PM: HKLM\software\classes\appid\{9236268d-8b29-49e5-96d9-daf5fe76941c}\ (ID = 866979)
1:01 PM: HKLM\software\classes\appid\{4c0b0548-ae0b-4008-999d-db33b8b2eb90}\ (ID = 866973)
1:01 PM: HKLM\software\classes\appid\trayicon.exe\ (ID = 866971)
1:01 PM: HKLM\software\classes\appid\mpagent.dll\ (ID = 866967)
1:01 PM: HKLM\software\classes\appid\mediapipe.exe\ (ID = 866965)
1:01 PM: HKLM\software\classes\appid\downloadmanager.exe\ (ID = 866963)
1:01 PM: HKLM\software\classes\mpagent.agent.1\ (ID = 866947)
1:01 PM: HKLM\software\classes\mpagent.agent\ (ID = 866941)
1:01 PM: HKLM\software\classes\mediapipe.gui.1\ (ID = 866937)
1:01 PM: HKLM\software\classes\mediapipe.gui\ (ID = 866931)
1:01 PM: HKLM\software\classes\downloadmanager.manager.1\ (ID = 866927)
1:01 PM: HKLM\software\classes\downloadmanager.manager\ (ID = 866921)
1:01 PM: HKLM\software\mediapipe\ (ID = 866893)
1:01 PM: HKCR\typelib\{ccebbeb5-d011-41b5-9f92-01f88a38dc0d}\ (ID = 866836)
1:01 PM: HKCR\typelib\{ab3b59a5-8bb4-46ab-a878-dfdb237d5bd5}\ (ID = 866816)
1:01 PM: HKCR\typelib\{555fb512-9f3b-4359-9d2a-3c10e750ce5e}\ (ID = 866796)
1:01 PM: HKCR\typelib\{45c2360e-bfdf-439b-a3ea-65e8383f9353}\ (ID = 866786)
1:01 PM: HKCR\clsid\{b3e19860-0cd5-4991-a066-4fca2704de59}\ (ID = 866747)
1:01 PM: Found Trojan Horse: p2pnetwork
1:01 PM: HKCR\clsid\{48bb16aa-3f6c-4b28-9884-1fcec1c5da65}\ (ID = 866723)
1:01 PM: HKCR\clsid\{1e9adaf2-4eda-4074-96ce-c9972e675c88}\ (ID = 866706)
1:01 PM: HKCR\appid\{ccebbeb5-d011-41b5-9f92-01f88a38dc0d}\ (ID = 866704)
1:01 PM: HKCR\appid\{99c4f93d-42a7-478d-8746-4afb6c10bc26}\ (ID = 866702)
1:01 PM: HKCR\appid\{9236268d-8b29-49e5-96d9-daf5fe76941c}\ (ID = 866700)
1:01 PM: HKCR\appid\{4c0b0548-ae0b-4008-999d-db33b8b2eb90}\ (ID = 866694)
1:01 PM: HKCR\appid\trayicon.exe\ (ID = 866692)
1:01 PM: HKCR\appid\mpagent.dll\ (ID = 866688)
1:01 PM: HKCR\appid\mediapipe.exe\ (ID = 866686)
1:01 PM: HKCR\appid\downloadmanager.exe\ (ID = 866684)
1:01 PM: HKCR\mpagent.agent.1\ (ID = 866668)
1:01 PM: HKCR\mpagent.agent\ (ID = 866662)
1:01 PM: HKCR\mediapipe.gui.1\ (ID = 866658)
1:01 PM: HKCR\mediapipe.gui\ (ID = 866652)
1:01 PM: HKCR\downloadmanager.manager.1\ (ID = 866648)
1:01 PM: HKCR\downloadmanager.manager\ (ID = 866642)
1:01 PM: Found Adware: mediapipe
1:01 PM: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objecta\ (ID = 735573)
1:01 PM: Found Adware: security2k hijacker
1:01 PM: HKLM\software\classes\clsid\{ef98af7b-1f54-4079-91bc-3996deaba45a}\ (ID = 726877)
1:01 PM: HKLM\software\classes\clsid\{d099baaa-a587-4dfb-9b7e-f7ea0fc04355}\ (ID = 726862)
1:01 PM: HKLM\software\classes\clsid\{009506e8-8cad-4ca9-81d4-d815e7e4330a}\ (ID = 726847)
1:01 PM: HKLM\software\cursorcafe\ (ID = 726812)
1:01 PM: HKCR\clsid\{ef98af7b-1f54-4079-91bc-3996deaba45a}\ (ID = 726777)
1:01 PM: HKCR\clsid\{d099baaa-a587-4dfb-9b7e-f7ea0fc04355}\ (ID = 726762)
1:01 PM: HKCR\clsid\{009506e8-8cad-4ca9-81d4-d815e7e4330a}\ (ID = 726747)
1:01 PM: Found Adware: starware cursorcafe
1:01 PM: HKLM\software\screensavers.com\ (ID = 140569)
1:01 PM: Found Adware: comet systems
1:00 PM: HKLM\software\classes\appid\altnet signing module.exe\ (ID = 103489)
1:00 PM: HKLM\software\classes\appid\adm.exe\ (ID = 103488)
1:00 PM: HKCR\appid\altnet signing module.exe\ (ID = 103449)
1:00 PM: HKCR\appid\adm.exe\ (ID = 103448)
1:00 PM: Found Adware: altnet
1:00 PM: Starting Registry Sweep
1:00 PM: Memory Sweep Complete, Elapsed Time: 00:02:47
12:58 PM: Starting Memory Sweep
12:58 PM: Sweep initiated using definitions version 719
12:58 PM: Spy Sweeper 5.0.5.1286 started
12:58 PM: | Start of Session, Saturday, July 15, 2006 |
********
12:58 PM: | End of Session, Saturday, July 15, 2006 |
12:56 PM: None
12:56 PM: Traces Found: 0
12:56 PM: Memory Sweep Complete, Elapsed Time: 00:01:17
12:56 PM: Sweep Canceled
12:55 PM: Starting Memory Sweep
12:55 PM: Sweep initiated using definitions version 719
12:55 PM: Spy Sweeper 5.0.5.1286 started
12:55 PM: | Start of Session, Saturday, July 15, 2006 |
********
12:55 PM: | End of Session, Saturday, July 15, 2006 |
12:52 PM: Your spyware definitions have been updated.
Operation: File Access
Target:
Source: C:\PROGRAM FILES\NETWORK ASSOCIATES\VIRUSSCAN\MCSHIELD.EXE
12:52 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
12:48 PM: Shield States
12:48 PM: Spyware Definitions: 691
12:48 PM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
12:46 PM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
12:46 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
12:28 PM: Shield States
12:28 PM: Spyware Definitions: 691
12:28 PM: Spy Sweeper 5.0.5.1286 started
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
12:00 PM: Shield States
11:59 AM: Spyware Definitions: 691
11:59 AM: Spy Sweeper 5.0.5.1286 started
11:59 AM: Spy Sweeper 5.0.5.1286 started
11:59 AM: | Start of Session, Saturday, July 15, 2006 |
********