SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 10/17/2008 at 00:00 AM
Application Version : 4.21.1004
Core Rules Database Version : 3600
Trace Rules Database Version: 1586
Scan type : Complete Scan
Total Scan Time : 03:41:49
Memory items scanned : 179
Memory threats detected : 0
Registry items scanned : 6308
Registry threats detected : 16
File items scanned : 92921
File threats detected : 57
Adware.E404 Helper/Variant-AG
HKLM\Software\Classes\CLSID\{95325092-62FC-473B-B32A-AE613278855B}
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}\InprocServer32
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}\InprocServer32#ThreadingModel
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}\ProgID
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}\Programmable
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}\TypeLib
HKCR\CLSID\{95325092-62FC-473B-B32A-AE613278855B}\VersionIndependentProgID
HKCR\w123.w123mgr.1
HKCR\w123.w123mgr.1\CLSID
HKCR\w123.w123mgr
HKCR\w123.w123mgr\CLSID
HKCR\w123.w123mgr\CurVer
HKCR\TypeLib\{E63648F7-3933-440E-AAAA-A8584DD7B7EB}
C:\WINDOWS\SYSTEM32\311496\311496.DLL
Trojan.FakeAlert-IEBT
HKU\S-1-5-21-724363441-1311669808-462287956-1007\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{144A6B24-0EBC-4D89-BF09-A06A718E57B5}
Adware.Tracking Cookie
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@adopt.specificclick[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@ads.as4x.tmcs.ticketmaster[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@atwola[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@c3.gostats[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@creativeby.viewpoint[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@edge.ru4[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@gostats[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@icc.intellisrv[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@insightexpress[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@intellisrv[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@nandomedia[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@nextag[2].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@partner2profit[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@windowsmedia[1].txt
C:\Documents and Settings\danfarsht\Local Settings\Temp\Cookies\danfarsht@www.olmstedcountyfair[1].txt
Trojan.Net-Explore/DND
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1400\A0060532.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1428\A0060704.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1438\A0061688.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1438\A0061689.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1448\A0061801.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1452\A0061842.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1469\A0062222.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1469\A0062235.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062557.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062558.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062564.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062584.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062944.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062945.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062955.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062963.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062972.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1482\A0062973.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0062978.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0062988.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0062999.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0063000.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0063006.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0063007.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0063016.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1483\A0063021.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1484\A0063025.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1484\A0063041.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1484\A0063048.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1484\A0063050.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1485\A0063058.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1485\A0063059.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063081.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063083.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063084.EXE
C:\WINDOWS\COUNAARC.EXE
Trojan.Dropper/Gen
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063079.DLL
Adware.E404 Helper/Dropper
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063080.EXE
Trojan.Unclassified-Packed/Suspicious
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063085.DLL
Rogue.FakeAlert
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063086.DLL
Rogue.VirusResponseLab2009
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP1488\A0063087.EXE