I am a new user of Ad-aware and I dont know very much about computers, viruses, spyware, and adware. I just downloaded Ad-Aware, 6.0 and ran a scan. The results definitely seem to be a cause for concern. This is what it said:

Lavasoft Ad-aware Personal Build 6.181
Logfile created on :Wednesday, May 26, 2004 3:58:13 AM
Created with Ad-aware Personal, free for private use.
Using reference-file :01R298 20.04.2004
______________________________________________________

Ad-aware Settings
=========================
Set : Activate in-depth scan (Recommended)
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep scan registry


5-26-2004 3:58:13 AM - Scan started. (Smart mode)

Listing running processes
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

#:1 [kernel32.dll]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4279184423
Threads : 8
Priority : High
FileSize : 524 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright (C) Microsoft Corp. 1991-2000
CompanyName : Microsoft Corporation
FileDescription : Win32 Kernel core component
InternalName : KERNEL32
OriginalFilename : KERNEL32.DLL
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:2 [msgsrv32.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294929095
Threads : 1
Priority : Normal
FileSize : 11 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright (C) Microsoft Corp. 1992-1998
CompanyName : Microsoft Corporation
FileDescription : Windows 32-bit VxD Message Server
InternalName : MSGSRV32
OriginalFilename : MSGSRV32.EXE
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:3 [spool32.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294927039
Threads : 2
Priority : Normal
FileSize : 44 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright (C) Microsoft Corp. 1994 - 1998
CompanyName : Microsoft Corporation
FileDescription : Spooler Sub System Process
InternalName : spool32
OriginalFilename : spool32.exe
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:4 [mmtask.tsk]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294965203
Threads : 1
Priority : Normal
FileSize : 1 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Multimedia background task support module
InternalName : mmtask.tsk
OriginalFilename : mmtask.tsk
ProductName : Microsoft Windows
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:5 [mprexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294963807
Threads : 2
Priority : Normal
FileSize : 28 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright (C) Microsoft Corp. 1993-2000
CompanyName : Microsoft Corporation
FileDescription : WIN32 Network Interface Service Process
InternalName : MPREXE
OriginalFilename : MPREXE.EXE
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:6 [mstask.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294850319
Threads : 2
Priority : Normal
FileSize : 124 KB
FileVersion : 4.71.2721.1
ProductVersion : 4.71.2721.1
Copyright : Copyright (C) Microsoft Corp. 2000
CompanyName : Microsoft Corporation
FileDescription : Task Scheduler Engine
InternalName : TaskScheduler
OriginalFilename : mstask.exe
ProductName : Microsoft
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:7 [wmp54g.exe]
FilePath : C:\PROGRAM FILES\WMPCI54G WLAN MONITOR\
ProcessID : 4294864643
Threads : 7
Priority : Normal
FileSize : 3226 KB
FileVersion : 1.0.6.3
ProductVersion : 1.0.6.3
CompanyName : Cisco Linksys Corporation
FileDescription : WMP54G Utility for USA
Created on : 4/25/2004 3:59:07 PM
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 8/21/2003 8:11:12 PM

#:8 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294806983
Threads : 20
Priority : Normal
FileSize : 220 KB
FileVersion : 5.50.4134.100
ProductVersion : 5.50.4134.100
Copyright : Copyright (C) Microsoft Corp. 1981-2000
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
OriginalFilename : EXPLORER.EXE
ProductName : Microsoft(R) Windows (R) 2000 Operating System
Created on : 6/8/2000 9:00:00 PM
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:9 [taskmon.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294822211
Threads : 1
Priority : Normal
FileSize : 28 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright (C) Microsoft Corp. 1998
CompanyName : Microsoft Corporation
FileDescription : Task Monitor
InternalName : TaskMon
OriginalFilename : TASKMON.EXE
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:10 [systray.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294712351
Threads : 2
Priority : Normal
FileSize : 36 KB
FileVersion : 4.90.3000
ProductVersion : 4.90.3000
Copyright : Copyright (C) Microsoft Corp. 1993-2000
CompanyName : Microsoft Corporation
FileDescription : System Tray Applet
InternalName : SYSTRAY
OriginalFilename : SYSTRAY.EXE
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:11 [stmgr.exe]
FilePath : C:\WINDOWS\SYSTEM\RESTORE\
ProcessID : 4294727735
Threads : 7
Priority : Normal
FileSize : 60 KB
FileVersion : 4.90.0.2533
ProductVersion : 4.90.0.2533
Copyright : Copyright (C) Microsoft Corp. 1981-2000
CompanyName : Microsoft Corporation
FileDescription : Microsoft (R) PC State Manager
InternalName : StateMgr.exe
OriginalFilename : StateMgr.exe
ProductName : Microsoft (r) PCHealth
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:12 [ptudfapp.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294716079
Threads : 2
Priority : Normal
FileSize : 268 KB
FileVersion : 1, 5, 0, 170
ProductVersion : 1, 5, 0, 0
Copyright : Copyright
CompanyName : Prassi Software USA, Inc.
FileDescription : abCD Interface application
InternalName : abCD
OriginalFilename : PtUDFapp.exe
ProductName : abCD
Created on : 5/19/2004 3:28:31 PM
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 9/12/2000 12:08:16 AM

#:13 [realsched.exe]
FilePath : C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\
ProcessID : 4294715835
Threads : 2
Priority : Normal
FileSize : 176 KB
FileVersion : 0.1.0.3034
ProductVersion : 0.1.0.3034
Copyright : Copyright
CompanyName : RealNetworks, Inc.
FileDescription : RealNetworks Scheduler
InternalName : schedapp
OriginalFilename : realsched.exe
ProductName : RealPlayer (32-bit)
Created on : 5/25/2004 3:13:20 AM
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 5/25/2004 3:13:22 AM

#:14 [wmiexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294721843
Threads : 3
Priority : Normal
FileSize : 16 KB
FileVersion : 4.90.2452.1
ProductVersion : 4.90.2452.1
Copyright : Copyright (C) Microsoft Corp. 1981-1999
CompanyName : Microsoft Corporation
FileDescription : WMI service exe housing
InternalName : wmiexe
OriginalFilename : wmiexe.exe
ProductName : Microsoft(R) Windows(R) Millennium Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:15 [wkcalrem.exe]
FilePath : C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\WORKS SHARED\
ProcessID : 4294770447
Threads : 2
Priority : Normal
FileSize : 24 KB
FileVersion : 6.00.1828.1
ProductVersion : 6.00.1828.1
Copyright : Copyright
CompanyName : Microsoft
FileDescription : Microsoft
InternalName : WkCalRem
OriginalFilename : WKCALREM.EXE
ProductName : Microsoft
Created on : 8/8/2000 4:00:00 PM
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 8/8/2000 4:00:00 PM

#:16 [ddhelp.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294593859
Threads : 3
Priority : Realtime
FileSize : 45 KB
FileVersion : 4.07.01.3000
ProductVersion : 4.07.01.3000
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Microsoft DirectX Helper
InternalName : DDHelp.exe
OriginalFilename : DDHelp.exe
ProductName : Microsoft
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:17 [wuauclt.exe]
FilePath : C:\WINDOWS\
ProcessID : 4294581555
Threads : 3
Priority : Idle
FileSize : 152 KB
FileVersion : 5.4.1083.9
ProductVersion : 5.4.1083.9
Copyright : Copyright (C) Microsoft Corp. 1981-1999
CompanyName : Microsoft Corporation
FileDescription : Microsoft AutoUpdate
InternalName : WUAUCLT.EXE
OriginalFilename : WUAUCLT.EXE
ProductName : Microsoft Windows Update - AutoUpdate feature
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:18 [pstores.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294818739
Threads : 3
Priority : Normal
FileSize : 82 KB
FileVersion : 5.00.2133.2
ProductVersion : 5.00.2133.2
Copyright : Copyright (C) Microsoft Corp. 1981-1999
CompanyName : Microsoft Corporation
FileDescription : Protected storage server
InternalName : Protected storage server
OriginalFilename : Protected storage server
ProductName : Microsoft(R) Windows (R) 2000 Operating System
Created on : 1/1/1601
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 6/8/2000 9:00:00 PM

#:19 [realplay.exe]
FilePath : C:\PROGRAM FILES\REAL\REALPLAYER\
ProcessID : 4294525555
Threads : 1
Priority : Normal
FileSize : 200 KB
FileVersion : 6.0.12.872
ProductVersion : 6.0.12.872
Copyright : Copyright
CompanyName : RealNetworks, Inc.
FileDescription : RealPlayer
InternalName : REALPLAY
OriginalFilename : REALPLAY.EXE
ProductName : RealPlayer (32-bit)
Created on : 5/25/2004 3:13:28 AM
Last accessed : 5/26/2004 4:00:00 AM
Last modified : 5/25/2004 3:13:30 AM

Recommended Answers

All 5 Replies

#:20 [ad-aware.exe]
FilePath           : C:\PROGRAM FILES\LAVASOFT\AD-AWARE 6\
ProcessID          : 4294701255
Threads            : 2
Priority           : Normal
FileSize           : 668 KB
FileVersion        : 6.0.1.181
ProductVersion     : 6.0.0.0
Copyright          : Copyright
CompanyName        : Lavasoft Sweden
FileDescription    : Ad-aware 6 core application
InternalName       : Ad-aware.exe
OriginalFilename   : Ad-aware.exe
ProductName        : Lavasoft Ad-aware Plus
Created on         : 5/26/2004 7:57:48 AM
Last accessed      : 5/26/2004 4:00:00 AM
Last modified      : 7/13/2003 1:00:20 AM


Memory scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 0
Objects found so far: 0



Started registry scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯


Alexa Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_LOCAL_MACHINE
Object             : SOFTWARE\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{0c097121-c5d6-47eb-841d-30bff71a71c4}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{7F23E6E5-0E79-4aee-B723-B1463805D5A9}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{8ECF83A0-1AC9-11D4-8501-00A0CC5D1F63}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{B9BA256A-075B-49ea-B9E2-7DBC2EF021D5}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{FA13A9FA-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{05EF74A5-E109-11D2-A566-444553540000}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{0E7AE465-EE8D-11D2-A566-444553540000}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{1113C0B6-5300-4D5D-B2D7-35C14B28341B}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{111D8B01-96C5-46DD-94D1-C6E8B1F69F44}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{16410859-886F-4579-BC1F-330A139D0F0F}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{35ED7DFB-A8ED-4216-A4BB-BC08C326EF08}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{399A8818-2000-436C-9A55-0016E5E3D227}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{3F44B498-8FD4-4A1E-852C-170156ED27C0}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{52889E01-CB46-11D2-96BC-00104B242E64}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{5C49CBD2-8ED7-439B-8668-32149F84A235}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{5DD15C3E-FC35-4E6F-B34C-E030D6439469}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{6E6CF8E5-D795-11D2-A566-444553540000}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{79884200-3ADE-11D3-AC39-00105A2057FA}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{810E95C2-F908-4E02-9B28-B92C3A778D0D}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{8DB2BC32-56E9-4349-B125-CB2561A06626}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{A73F5102-3782-4945-BF97-889F9B6DC9A5}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{AA0C96F9-A994-42D7-9543-842CF85E1BA7}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{B57613B6-EF02-4D96-99C6-70C9A2014A14}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{BDB9B021-CAFF-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{BDB9B022-CAFF-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{C1DA7AB8-54FC-4971-9AFB-1BCB9AFC3AA2}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{C3A156D4-503F-4779-A673-657308D94FAF}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{D72AC8E7-F41D-11D2-A566-444553540000}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{DE3E540A-F0F2-4761-99BE-AFC6DC427E30}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{EA6F254D-1A8C-4518-8FE0-E9B94FD134ED}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{EC914A5C-7C4B-4AC8-8C86-C10FF5C0D23D}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{F10493C1-D0B6-11D2-A566-444553540000}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AA3A-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AA3E-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AA40-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AA44-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AA46-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AA50-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FA13AAFA-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{FECA7CFA-1083-4073-A98A-CF3389FCAF6A}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_LOCAL_MACHINE
Object             : SOFTWARE\WildTangent



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : TypeLib\{B162D478-EF46-4475-B1FE-216BDEDB7FAD}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : TypeLib\{B7E20302-C22C-4AF2-9D75-C3EB6EEE9DD8}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : TypeLib\{FA13AA2E-CA9B-11D2-9780-00104B242EA3}



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WDMHHost.WTHoster



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WDMHHost.WTHoster.1



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WT.WTMultiplayer



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WT.WTMultiplayer.1



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WT3D.WT



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WT3D.WT.1



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WTVis.WTVisReceiver



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WTVis.WTVisReceiver.1



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WTVis.WTVisSender



WildTangent Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : WTVis.WTVisSender.1



WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Bridge.brdg



WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Bridge.brdg.1



WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}



WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : TypeLib\{DDAF2479-6F00-4599-998A-3ED75686C6D0}



Omi-Update Object recognized!
Type               : RegValue
Data               :
Rootkey            : HKEY_CURRENT_USER
Object             : Software\Microsoft\Windows\CurrentVersion\Run
Value              : msmc



Registry scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 63
Objects found so far: 63



Started deep registry scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯


Deep registry scan result :
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 0
Objects found so far: 63



¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯


Tracking Cookie Object recognized!
Type               : File
Data               : [email]lila@a.as-us.falkag[1].txt[/email]
Object             : C:\WINDOWS\Cookies\


Created on         : 5/26/2004 7:56:15 AM
Last accessed      : 5/26/2004 4:00:00 AM
Last modified      : 5/26/2004 7:56:16 AM



¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯



Deep scanning and examining files (C:)
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯



Performing conditional scans..
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯


WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : Interface\{4FDBDBAD-FEFE-4C4C-9CC1-1181052AFB12}



WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : atl.registrar



WinFavorites Object recognized!
Type               : RegKey
Data               :
Rootkey            : HKEY_CLASSES_ROOT
Object             : CLSID\{44ec053a-400f-11d0-9dcd-00a0c90391d3}



WinFavorites Object recognized!
Type               : File
Data               : bridge.dll
Object             : c:\windows\system\
FileSize           : 68 KB
FileVersion        : 1, 0, 0, 117
ProductVersion     : 1, 0, 0, 117
Copyright          : Copyright 2003
FileDescription    : bridge Module
InternalName       : bridge
OriginalFilename   : bridge.DLL
ProductName        : bridge Module
Created on         : 5/26/2004 6:38:04 AM
Last accessed      : 5/26/2004 4:00:00 AM
Last modified      : 5/26/2004 6:38:06 AM


WinFavorites Object recognized!
Type               : File
Data               : a.exe
Object             : c:\windows\system\
FileSize           : 14 KB
FileVersion        : 1, 0, 0, 1
ProductVersion     : 1, 0, 0, 1
Copyright          : Copyright
OriginalFilename   : a.exe
Created on         : 5/26/2004 7:13:27 AM
Last accessed      : 5/26/2004 4:00:00 AM
Last modified      : 5/26/2004 7:13:28 AM


Omi-Update Object recognized!
Type               : File
Data               : cfg.dat
Object             : c:\windows\system\


Created on         : 8/23/2001
Last accessed      : 5/26/2004 4:00:00 AM
Last modified      : 8/23/2001


Omi-Update Object recognized!
Type               : File
Data               : msmc.exe
Object             : c:\windows\system\
FileSize           : 46 KB
Created on         : 5/24/2004 11:43:57 PM
Last accessed      : 5/26/2004 4:00:00 AM
Last modified      : 5/24/2004 11:43:58 PM


Conditional scan result:
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
New objects : 7
Objects found so far: 71



4:01:43 AM Scan complete


Summary of this scan
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
Total scanning time :00:03:29:870
Objects scanned :34669
Objects identified :71
Objects ignored :0
New objects :71

Can anyone help? Does anyone have any suggestions or ideas about how I should proceed. Should I quarantine these objects? (I'm not sure what that means) :?: :?: :?: :!: I dont really know anything actually. I thought I had removed Wild Tangent. Sorry to be so uninformed. I would really appreciate any advice, directions, or information. Thanks so much. :confused:

Quarantine just puts them aside for analysis later, dont bother, just tick the lot and click next. When you are asked if you want to remove them, click OK.

Try this to update your system for anti-virus patches:-
http://windowsupdate.microsoft.com/

Try this for some free anti-virus software to protect your system:-
http://www.avast.com/i_idt_1016.html

Good luck

Aquarius
:)

Quarantine just puts them aside for analysis later, dont bother, just tick the lot and click next. When you are asked if you want to remove them, click OK.

Agreed, I've never personally had Ad Aware detect a "false positive", and I've never had it delete something it shouldn't.

lola,

In the case of your particular log, I don't see anthing questionable- looks like it all needs to go.

Thank you both very much! I deleted it all.
:mrgreen: :mrgreen:

Glad we could help. :)

Did that solve your problems? If so, I'll mark this thread as solved.

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.