0

I downloaded spydoctor and ran it. it scanned my computer and found 55 infections. of course after the scan it said to clean please register which cost $$ :( but I saved the log.
and was wondering if that is a good spyware remover? here is the log.


<?xml version="1.0"?>
<data>
<scan>
<scanstart>3/4/2006 12:43:39 AM</scanstart>
<timestamp>3/4/2006 5:42:53 AM</timestamp>
<item>
<name>Trojan.Downloader.Small.AIQ</name>
<type>general malware</type>
<location>multiple</location>
<risk>High</risk>
<description>Trojan.Downloader.Small.AIQ runs as a process in memory and periodically contacts servers for malicious files to download.</description>
<tool>genscanner.dll</tool>
</item>
<item>
<name>SpyAxe</name>
<type>Processes</type>
<location>Explorer.EXE (C:\WINNT\system32\dxmpp.dll)</location>
<risk>Elevated</risk>
<description>SpyAxe is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>pscanner.dll</tool>
</item>
<item>
<name>Trojan.Dropper.Small.OI</name>
<type>Registry</type>
<location>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler##{5FFD4A60-C328-128D-44EB-21D258091D15}</location>
<risk>High</risk>
<description>Trojan.Dropper.Small.OI silently hides itself inside explorer. Running in stealth mode the Trojan will silently try to download additional malware from remote servers over the internet. More to that it will hijack your homepage to www.searchzoommer.com.</description>
<tool>StartupScanner.dll</tool>
</item>
<item>
<name>Windows AdControl</name>
<type>Registry</type>
<location>HKCR\WinServAdX.Installer</location>
<risk>Elevated</risk>
<description>Windows AdControl tracks a users browsing habits and distributes the data to remote servers to produce pop-up advertisements, mainly of pornographic nature.</description>
<tool>regscanner.dll</tool>
</item>
<item>
<name>Windows AdControl</name>
<type>Registry</type>
<location>HKCR\WinServAdX.Installer##</location>
<risk>Elevated</risk>
<description>Windows AdControl tracks a users browsing habits and distributes the data to remote servers to produce pop-up advertisements, mainly of pornographic nature.</description>
<tool>regscanner.dll</tool>
</item>
<item>
<name>Windows AdControl</name>
<type>Registry</type>
<location>HKCR\WinServAdX.Installer\CLSID</location>
<risk>Elevated</risk>
<description>Windows AdControl tracks a users browsing habits and distributes the data to remote servers to produce pop-up advertisements, mainly of pornographic nature.</description>
<tool>regscanner.dll</tool>
</item>
<item>
<name>Windows AdControl</name>
<type>Registry</type>
<location>HKCR\WinServAdX.Installer\CLSID##</location>
<risk>Elevated</risk>
<description>Windows AdControl tracks a users browsing habits and distributes the data to remote servers to produce pop-up advertisements, mainly of pornographic nature.</description>
<tool>regscanner.dll</tool>
</item>
<item>
<name>Windows ServeAd</name>
<type>Registry</type>
<location>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs##C:\WINNT\Downloaded Program Files\WinServAdX.dll</location>
<risk>Elevated</risk>
<description>An adware based ad delivery software which displays targeted advertising offers.</description>
<tool>regscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\dpiujutihkwq</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\fzsekwUcujgko</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\ieuKgzlgbbRnm</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\iiHsfOlbnc</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\InProcServer32</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\jqVtnzai</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\lobp</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\mtQqSm</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\neRdqwlpudc</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\pVcmdotxyO</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\qjpj</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\wduZdsduaoYij</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\Zbvabmsjafyam</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\ZhVuwhVocXfv</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKCR\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\zmEuynwi</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\dpiujutihkwq</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\fzsekwUcujgko</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\ieuKgzlgbbRnm</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\iiHsfOlbnc</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\InProcServer32</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\jqVtnzai</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\lobp</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\mtQqSm</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\neRdqwlpudc</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\pVcmdotxyO</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\qjpj</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\wduZdsduaoYij</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\Zbvabmsjafyam</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\ZhVuwhVocXfv</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>SpyFalcon</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{330A77C2-C15A-43B5-055C-B4E35EAED279}\zmEuynwi</location>
<risk>Medium</risk>
<description>SpyFalcon is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Downloader.Small.AIQ</name>
<type>Registry</type>
<location>HKCR\CLSID\{DAA873D4-958C-453C-81CA-3FE6F3676A87}</location>
<risk>High</risk>
<description>Trojan.Downloader.Small.AIQ runs as a process in memory and periodically contacts servers for malicious files to download.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Downloader.Small.AIQ</name>
<type>Registry</type>
<location>HKCR\CLSID\{DAA873D4-958C-453C-81CA-3FE6F3676A87}\InprocServer32</location>
<risk>High</risk>
<description>Trojan.Downloader.Small.AIQ runs as a process in memory and periodically contacts servers for malicious files to download.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Downloader.Small.AIQ</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{DAA873D4-958C-453C-81CA-3FE6F3676A87}</location>
<risk>High</risk>
<description>Trojan.Downloader.Small.AIQ runs as a process in memory and periodically contacts servers for malicious files to download.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Downloader.Small.AIQ</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{DAA873D4-958C-453C-81CA-3FE6F3676A87}\InprocServer32</location>
<risk>High</risk>
<description>Trojan.Downloader.Small.AIQ runs as a process in memory and periodically contacts servers for malicious files to download.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Dropper.Small.OI</name>
<type>Registry</type>
<location>HKCR\CLSID\{5FFD4A60-C328-128D-44EB-21D258091D15}</location>
<risk>High</risk>
<description>Trojan.Dropper.Small.OI silently hides itself inside explorer. Running in stealth mode the Trojan will silently try to download additional malware from remote servers over the internet. More to that it will hijack your homepage to www.searchzoommer.com.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Dropper.Small.OI</name>
<type>Registry</type>
<location>HKCR\CLSID\{5FFD4A60-C328-128D-44EB-21D258091D15}\InProcServer32</location>
<risk>High</risk>
<description>Trojan.Dropper.Small.OI silently hides itself inside explorer. Running in stealth mode the Trojan will silently try to download additional malware from remote servers over the internet. More to that it will hijack your homepage to www.searchzoommer.com.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Dropper.Small.OI</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{5FFD4A60-C328-128D-44EB-21D258091D15}</location>
<risk>High</risk>
<description>Trojan.Dropper.Small.OI silently hides itself inside explorer. Running in stealth mode the Trojan will silently try to download additional malware from remote servers over the internet. More to that it will hijack your homepage to www.searchzoommer.com.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Trojan.Dropper.Small.OI</name>
<type>Registry</type>
<location>HKLM\Software\Classes\CLSID\{5FFD4A60-C328-128D-44EB-21D258091D15}\InProcServer32</location>
<risk>High</risk>
<description>Trojan.Dropper.Small.OI silently hides itself inside explorer. Running in stealth mode the Trojan will silently try to download additional malware from remote servers over the internet. More to that it will hijack your homepage to www.searchzoommer.com.</description>
<tool>bhoscanner.dll</tool>
</item>
<item>
<name>Tracking Cookie(s)</name>
<type>Cookies (counter2.hitslink.com)</type>
<location>C:\Documents and Settings\pbmp3\Cookies\pbmp3@counter2.hitslink[1].txt</location>
<risk>Medium</risk>
<description>A tracking cookie is any cookie that is shared among two or more unrelated sites for the purpose of tracking a user's browsing and/or gathering and/or sharing information which many users regard as &quot;private&quot; Definitions of &quot;private&quot; may differ. Some consider any code &quot;private&quot; if it uniquely identifies a user, even if it is not their name or email address. A typical tracking cookie might look like this: &quot;1www.somedomainname.com/ 0 2719785088 29508922 2980377808 29496852 * &quot; The encoded info in this cookie includes a unique UserID assigned by a web server; the cookie can be used to track a user as they visit other sites that accept this cookie.</description>
<tool>BAScanner.dll</tool>
</item>
<item>
<name>Tracking Cookie(s)</name>
<type>Cookies (atdmt.com)</type>
<location>C:\Documents and Settings\pbmp3\Cookies\pbmp3@atdmt[1].txt</location>
<risk>Medium</risk>
<description>A tracking cookie is any cookie that is shared among two or more unrelated sites for the purpose of tracking a user's browsing and/or gathering and/or sharing information which many users regard as &quot;private&quot; Definitions of &quot;private&quot; may differ. Some consider any code &quot;private&quot; if it uniquely identifies a user, even if it is not their name or email address. A typical tracking cookie might look like this: &quot;1www.somedomainname.com/ 0 2719785088 29508922 2980377808 29496852 * &quot; The encoded info in this cookie includes a unique UserID assigned by a web server; the cookie can be used to track a user as they visit other sites that accept this cookie.</description>
<tool>BAScanner.dll</tool>
</item>
<item>
<name>Tracking Cookie(s)</name>
<type>Cookies (www.myaffiliateprogram.com)</type>
<location>C:\Documents and Settings\pbmp3\Cookies\pbmp3@www.myaffiliateprogram[1].txt</location>
<risk>Medium</risk>
<description>A tracking cookie is any cookie that is shared among two or more unrelated sites for the purpose of tracking a user's browsing and/or gathering and/or sharing information which many users regard as &quot;private&quot; Definitions of &quot;private&quot; may differ. Some consider any code &quot;private&quot; if it uniquely identifies a user, even if it is not their name or email address. A typical tracking cookie might look like this: &quot;1www.somedomainname.com/ 0 2719785088 29508922 2980377808 29496852 * &quot; The encoded info in this cookie includes a unique UserID assigned by a web server; the cookie can be used to track a user as they visit other sites that accept this cookie.</description>
<tool>BAScanner.dll</tool>
</item>
<item>
<name>Advertising</name>
<type>Cookies (com.com)</type>
<location>C:\Documents and Settings\pbmp3\Cookies\pbmp3@com[2].txt</location>
<risk>Low</risk>
<description>Advertising companies store cookies on a user's computer to serve targeted ads based on the web surfers interests when visiting a website serving their ads.</description>
<tool>BAScanner.dll</tool>
</item>
<item>
<name>Trojan.Popuper</name>
<type>Files</type>
<location>C:\WINNT\system32\dfrgsrv.exe</location>
<risk>High</risk>
<description>Trojan.Popuper hijacks the default Internet Explorer settings and changes your Internet Explorer homepage. It also appears as a security alert notifying users that their PC has been compromised and then downloads rogue antispyware products onto their PC.</description>
<tool>diskscanner.dll</tool>
</item>
<item>
<name>SpyAxe</name>
<type>Files</type>
<location>C:\WINNT\system32\dxmpp.dll</location>
<risk>Elevated</risk>
<description>SpyAxe is a Rogue Anti-Spyware product which comes bundled along with a malicious downloader. It is downloaded and installed without the users consent.</description>
<tool>diskscanner.dll</tool>
</item>
<item>
<name>CWS</name>
<type>Files</type>
<location>C:\WINNT\eybwe.dat</location>
<risk>High</risk>
<description>CWS is a trojan that hijacks Internet Explorer start and search settings to one of several different web sites. Most of these web sites appear to have an affiliate relationship with coolwebsearch.com in which coolwebsearch pays them for every visitor they refer. There could be other domains involved in the future.</description>
<tool>diskscanner.dll</tool>
</item>
<scanstop>3/4/2006 12:51:10 AM</scanstop>
<scannedcount>49335</scannedcount>
<foundcount>55</foundcount>
<ignoredcount>0</ignoredcount>
<toolslist>General Scanner, Process Scanner, LSP Scanner, Startup Scanner, Registry Scanner, Hosts file scanner, Browser Defaults, Favorites and ZoneMap Scanner, ActiveX Scanner, Browser Activity Scanner, Disk Scanner</toolslist>
</scan>


<item>3/4/2006 12:42:56 AM - Spyware Doctor started</item>

<item name="Version">3.5.1.498</item>

<item name="Database Version">3.04200</item>

<item name="Database Last Updated">3/4/2006</item>

<item name="Signatures In The Database">48928</item>

<item name="Last Scan Performed On">never</item>

<item name="Total Number Of Scans">0</item>

<item name="OnGuard Is Now">OFF</item>

<item name="Program Path">C:\Program Files\Spyware Doctor\</item>

<item name="Program Language">English</item>

<item name="Runs At Startup">No</item>

<item name="Auto Quarantine">Yes</item>

<item name="Delete After Restore">Yes</item>

<item name="Clear Log On Exit">No</item>

<item name="Clear Log Directory When It Exceeds Specified Size">Yes</item>

<item name="Maximum Log Directory Size (MB)">20</item>

<item name="Log Ignored Problems">Yes</item>

<item name="Startup Action">no action</item>

<item name="On Startup Clean Problems Automatically">No</item>

<item name="Exit After Startup Scan">No</item>

<item name="Auto Smart Update">No</item>

<item name="Ignored Items"></item>

</data>

6
Contributors
7
Replies
8
Views
11 Years
Discussion Span
Last Post by jholland1964
0

O ya, I'd definitly recommend Ewido. It's free, and catches a wide variety of things. Out of curiosity, is this about the same computer that's mentioned in the other post by you (it was posted around the same time)? If so, mention this in the other thread, and it would be good to remove it if its unnecessary without money.

If it's a different computer, ya could always post another HJT log here.

Thanks

0

Log is hard to read really, but I am seeing some bad names in there.

Follow the instructions in this post on using HijackThis and attach a log for us
http://www.daniweb.com/techtalkforums/thread28196.html

Also look in Add/Remove Programs and let me know if you see either of these

SpyFalcon
SpyAxe

When you return - attach the HijackThis log and we will outline the steps needed.

0

Trying to get an answer to a question. I am not a computer pro or tech or anything...just a woman using a home computer ! I have SpyHunter on my computer. It runs a scan and only finds items for repair in my cookies. I can run a Spy Doctor (free trial) and it will pick up over 450 threats. I cannot fix them because I have to purchase. Want to know what am I getting from the SpyHunter that I paid for if threats are being detected from something else. It is a gimmick to get me to purchase?

Thanks for any help!
kberry

0

Kerryberry, a suggestion, rather than post to a very old thread, please begin your own NEW thread, you are likely to get a lot more answers.
There are several great FREE programs out there that we always recommend. Uninstall BOTH of those programs you mentioned, post your own question and we will be happy to help.
Begin with Malwarebytes' Anti-Malware. Follow these directions
Please download Malwarebytes' Anti-Malware (MBA-M) to your Desktop.

* DoubleClick mbam-setup.exe and follow the prompts to install MBA-M.
* Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform full scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When MBA-M finishes, Notepad will open with the log. Please save it where you can find it easily. The log can also be opened by going to Start > All Programs > Malwarebytes' Anti-Malware > Logs > log-date.txt.

REBOOT after running MBA-M!

and post your problems and results of the MBA-M scan in your own new thread and one of us will be most happy to help you.
Judy

This topic has been dead for over six months. Start a new discussion instead.
Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.