SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 11/17/2007 at 11:14 PM
Application Version : 3.9.1008
Core Rules Database Version : 3342
Trace Rules Database Version: 1343
Scan type : Complete Scan
Total Scan Time : 05:37:45
Memory items scanned : 384
Memory threats detected : 2
Registry items scanned : 4077
Registry threats detected : 10
File items scanned : 115435
File threats detected : 74
Trojan.Downloader-LDCORE
C:\WINDOWS\SYSTEM32\LDCORE.DLL
C:\WINDOWS\SYSTEM32\LDCORE.DLL
Trojan.WinFixer
C:\WINDOWS\SYSTEM32\MLJJJ.DLL
C:\WINDOWS\SYSTEM32\MLJJJ.DLL
HKLM\Software\Classes\CLSID\{525EC465-1FBA-47E6-9484-5C069EA98EC0}
HKCR\CLSID\{525EC465-1FBA-47E6-9484-5C069EA98EC0}
HKCR\CLSID\{525EC465-1FBA-47E6-9484-5C069EA98EC0}\InprocServer32
HKCR\CLSID\{525EC465-1FBA-47E6-9484-5C069EA98EC0}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{52CAF739-D10B-43F8-9631-B3541C497D11}
HKCR\CLSID\{52CAF739-D10B-43F8-9631-B3541C497D11}
HKCR\CLSID\{52CAF739-D10B-43F8-9631-B3541C497D11}\InprocServer32
HKCR\CLSID\{52CAF739-D10B-43F8-9631-B3541C497D11}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{525EC465-1FBA-47E6-9484-5C069EA98EC0}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{52CAF739-D10B-43F8-9631-B3541C497D11}
Adware.Tracking Cookie
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@statse.webtrendslive[1].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@ad.yieldmanager[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@html[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@revsci[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@2o7[1].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@tacoda[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@interclick[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@advertising[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@www.burstnet[1].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@burstnet[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@atwola[1].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@doubleclick[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@atdmt[1].txt
C:\Documents and Settings\John.AARON-FFF79CF13\Cookies\john@bizrate[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@2o7[2].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@2o7[3].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@ad.yieldmanager[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@adrevolver[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@adrevolver[2].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@advertising[2].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@atdmt[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@atwola[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@doubleclick[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@fastclick[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@go.drivecleaner[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@msnportal.112.2o7[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@realmedia[2].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@revsci[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@stats.drivecleaner[2].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@tripod[1].txt
C:\Documents and Settings\Kaiko\Cookies\kaiko@zedo[2].txt
C:\Documents and Settings\Kaiko.AARON-FFF79CF13\Cookies\kaiko@ads3.think-adz[2].txt
Browser Hijacker.Favorites
C:\DOCUMENTS AND SETTINGS\KAIKO\FAVORITES\ONLINE SECURITY TEST.URL
Trojan.Downloader-AUPD
C:\DOCUMENTS AND SETTINGS\KAIKO.AARON-FFF79CF13\LOCAL SETTINGS\TEMP\AUPD.EXE
Adware.ZenoSearch-NVON
C:\DOCUMENTS AND SETTINGS\KAIKO.AARON-FFF79CF13\LOCAL SETTINGS\TEMP\T0CHD001.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP85\A0009462.EXE
C:\WINDOWS\SYSTEM32\DWDSRNGT.EXE
Trojan.ZenoSearch
C:\DOCUMENTS AND SETTINGS\KAIKO.AARON-FFF79CF13\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\WH8VOJS7\DQ[1].EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP85\A0009463.EXE
Adware.ClickSpring/Yazzle
C:\PROGRAM FILES\COMMON FILES\YAZZLE1560OINADMIN.EXE
C:\PROGRAM FILES\COMMON FILES\YAZZLE1560OINUNINSTALLER.EXE
Trojan.Downloader-Gen/Insider
C:\PROGRAM FILES\INETGET2\INSTALLEUR.EXE
Trojan.Downloader-Gen/WinAble-Installer
C:\PROGRAM FILES\TEMPORARY\WININSTALL.EXE
Adware.WinUpdates
C:\PROGRAM FILES\WINUPDATES\A.TMP
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP56\A0003320.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP59\A0005866.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP72\A0006124.EXE
Adware.AdRotator/RightOnz
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP46\A0002091.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP53\A0002236.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP72\A0007451.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP72\A0007676.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP72\A0007679.DLL
Adware.webHancer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP53\A0002197.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP53\A0002199.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP54\A0003308.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP54\A0003310.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP54\A0003311.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP58\A0003336.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP58\A0003338.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP72\A0007432.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP72\A0007444.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP85\A0009466.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP85\A0009467.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP85\A0009468.EXE
Malware.VirusProtectPro
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP67\A0005946.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP85\A0009472.EXE
Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{ECF6C83E-2E23-416D-882D-1EDBE4AAEB92}\RP83\A0009404.EXE
C:\WINDOWS\B147.EXE
Trojan.Downloader-Gen/Installer
C:\WINDOWS\B122.EXE
Adware.Vundo-Variant/Small
C:\WINDOWS\SYSTEM32\GEBABYV.DLL
Trojan.Downloader-Gen
C:\WINDOWS\SYSTEM32\WINPFZ32.SYS
Adware.Unknown Origin
C:\WINDOWS\SYSTEM32\ZXDNT3D.CFG