D
davidpatchen
After Running Microsoft AntiSpyware and Removing all
found spyware. I ran the following
applications to find out how effective the Microsoft
AntiSpyware application was. The
Following specifies the Application used and The Items
either missed by AntiSpyware's
removal process or not detected by AntiSpyware at all.
Some items are redundant between
other spyware programs run.
Referances *ND=Not Detected by AntiSpyware at all.
*D=Detected by AntiSpyware and Removed
but items were still found.
HKCR=HKEY_CLASSES_ROOT
HKLM=HKEY_LOCAL_MACHINE
HKCU=HKEY_CURRENT_USER
HKU=HKEY_USERS
SYS=C:\Windows\System32\
TIF=Temp Internet Files Directory
FAV=Favorites Directory
R=RegKey Entry
F=File Name
c=Cookie File
AntiVirus Gold V2.0 (Demo available at
www.antivirusgold.com) detected 36 items not removed
by AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
AZESearch - *D, 19 registry entries, 1 XML file, & 1 DLL
file
R=HKCR\AddressBar.Loader
R=HKCR\AddressBar.Loader.1
R=HKCR\CLSID\f65b197f-8260-4d52-909a-f70118e646eb
R=HKCR\Interface\636FF82A-830A-42EA-938B-6DC78B2AC30C
R=HKCR\Interface\A55C3BA7-DB1E-4652-867E-055CEAFE8018
R=HKCR\Interface\EF77D50B-5767-4E0E-A3A4-098670025F1D
R=HKCR\TypeLib\42FC3840-020C-4E93-A34C-4DF1A6330FBB
R=HKCR\TypeLib\DEA43CE3-D57B-45F6-A4D1-110E652CED11
R=HKCU\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser
R=HKLM\SOFTWARE\AZESearchCo
R=HKLM\SOFTWARE\Classes\AddressBar.Loader
R=HKLM\SOFTWARE\Classes\AddressBar.Loader.1
R=HKLM\SOFTWARE\Classes\CLSID\f65b197f-8260-4d52-909a-
f70118e646eb
R=HKLM\SOFTWARE\Classes\Interface\636FF82A-830A-42EA-938B-
6DC78B2AC30C
R=HKLM\SOFTWARE\Classes\Interface\A55C3BA7-DB1E-4652-867E-
055CEAFE8018
R=HKLM\SOFTWARE\Classes\Interface\EF77D50B-5767-4E0E-A3A4-
098670025F1D
R=HKLM\SOFTWARE\Classes\TypeLib\42FC3840-020C-4E93-A34C-
4DF1A6330FBB
R=HKLM\SOFTWARE\Classes\TypeLib\DEA43CE3-D57B-45F6-A4D1-
110E652CED11
R=HKLM\SOFTWARE\\LoaderCo
F=SYSazebar.xml
F=SYSiasada.dll
YourSiteBar - *D, 2 registry entries.
R=HKCU\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser
R=HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar
CoolWebSearch-MW Search, 1 registry entry.
R=HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar
Battler.Batch - *ND, 1 registry entry
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
System
Hosts.hijacker - *D, 1 file.
F=Location www.teen-biz.com
ADTMT.com - *ND, 1 cookie.
C=david patchen@atdmt[1].txt
ClickBank - *ND, 1 cookie .
C=david patchen@clickbank[2].txt
goClick - *ND, 1 cookie.
C=david (e-mail address removed)[1].txt
Overture.com - *ND, 2 cookies.
C=david patchen@overture[1].txt
C=david (e-mail address removed)[1].txt
SexTracker.com - *ND, 3 cookies.
C=david (e-mail address removed)[1].txt
C=david (e-mail address removed)[1].txt
C=david patchen@sextracker[2].txt
SpyLog.com - *ND, 1 cookie.
C=david patchen@spylog[2].txt
XXXToolBar.com - *ND, 1 cookie not removed.
C=david patchen@xxxtoolbar[2].txt
Spyware Killa (Freeware available at
www.SpywareKilla.com) detected 9 items not removed by
AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
Hotbar - *ND, 1 registry entry.
R=HKLM\System\currentcontrolset\control\deviceCLASSES\
fd0af4-b41d-11d2-9c95-00c004f7971e0
sextracker - *ND, 1 cookies.
C=sextracker.
VX2 - *ND, 1 cookie.
C=itc.
WildTangent - *ND, 1 cookie.
C=Wildtangent.
Aureate - *ND, 1 TLB file.
NOTE: This should have not been detected as it is the
type library for activemovie.
F=amcompat.tlb
DownloadWare - *ND, 1 DLL file.
NOTE: This should have not been detected as it is part of
Microsoft Train Simulator.
F=dw.exe
FlashTrack - *ND, 1 DLL file.
NOTE: This This should have not been detected as it is
part of 3D Studio Max.
F=flt.dll
PCTools Spyware Doctor (Demo avialable at
www.pctools.com) detected xx items not removed by
AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
AZESearch Toolbar - *D, 16 Registry Entries, 1 BMP File,
& 1 DLL file.
R=HKCR\AddressBar.Loader
R=HKCR\AddressBar.Loader.1
R=HKCR\Interface\38252777-2500-456E-8B3D-A55850306DA2
R=HKCR\Interface\636FF82A-830A-42EA-938B-6DC78B2AC30C
R=HKCR\Interface\A55C3BA7-DB1E-4652-867E-055CEAFE8018
R=HKCR\TypeLib\42FC3840-020C-4E93-A34C-4DF1A6330FBB
R=HKCR\TypeLib\DEA43CE3-D57B-45F6-A4D1-110E652CED11
R=HKLM\SOFTWARE\AZESearchCo
R=HKLM\SOFTWARE\LoaderCo
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\0D2DEF3A-F4F1-42EC-AC4F-132E7BA6E292
R=HKLM\SOFTWARE\Microsoft\Internet
Explorer\Toolbar\A19EF336-01D4-48E6-926A-FE7E1C747AED
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\A19EF336-01D4-48E6-926A-FE7E1C747AED
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\DA7FF3F8-08BE-4CAC-BC00-94D91C6AE7F4
R=HKCR\CLSID\f65b197f-8260-4d52-909a-f70118e646eb
R=HKLM\SOFTWARE\Classes\CLSID\f65b197f-8260-4d52-909a-
f70118e646eb
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\f65b197f-8260-4d52-909a-f70118e646eb
f=TIF\azesearch[1].bmp
f=TIF\azentretien[1].dll
1800search assistant - *D, 6 Registry Entries, 1
Directory File.
R=HKCR\CLSID\0AC49246-419B-4EE0-8917-8818DAAD6A4E
R=HKLM\SOFTWARE\Classes\CLSID\0AC49246-419B-4EE0-8917-
8818DAAD6A4E
R=HKCR\Interface\2B0ECEAC-F597-4858-A542-D966B49055B9
R=HKCR\Interface\DDEA2E1D-8555-45E5-AF09-EC9AA4EA27AD
R=HKCR\Interface\F1F1E775-1B21-454D-8D38-&C16519969E5
R=HKCR\TypeLib\5B6689B5-C2D4-4DC7-BFD1-24AC17E5FCDA
F=All Users\Start Menu\Programs\180Search Assistant
Internet Optimizer-Avenue Media - *ND, 7 Registry
Entries, 2 files.
R=HKLM\software\policies\avenue media\
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\policies\avenue media
R=HKLM\SOFTWARE\Microsoft\INternet Explorer\Main\BandRest
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet Explorer\Main\BandRest
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
AMeOpt
R=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
AMeOpt
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\00000010-6F7D-93E3-4A4827C2E4C8
F=TIF\optimize[1].exe
F=TIF\nem220[1].dll
istbar - *D, 1 Registry Entry, 1 Cookie, 1 EXE File
R=HKCR\TypeLib\D0288A41-9855-4A9B-8316-BABE243648DA
C=david patchen@ysbweb[1].txt
F=TIF\istrecover[1].exe
dapsol dialer - *ND, 1 registry entry.
R=HKCU\Software\Microsoft\Internet Explorer\Main\conc
Exact advertising Bargain buddy - *D as Cashback, 4
Registry Entries, 2 EXE Files.
R=HKCR\Interface\8EEE58D5-130E-4CBD-9C83-35A0564E5678
R=HKCR\Interface\C6906A23-4717-4E1F-B6FD-F06EBED15678
R=HKCR\TypeLib\4EB7BBE8-2E15-424B-9DDB-2CDB9516B2C3
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\F4E04583-354E-4076-BE7D-ED6A80FD66DA
F=TIF\bb[1].exe
F=TIF\package_marketing27[1].exe
Jraun - *ND, 4 Registy Entries.
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser\86227D9C-0EFE-4F8A-AA55-
30386A3F5686
R=HKLM\SOFTWARE\Microsoft\INternet
Explorer\Toolbar\86227D9C-0EFE-4F8A-AA55-30386A3F5686
R=HKLM\SOFTWARE\Microsoft\INternet
Explorer\WebBrowser\86227D9C-0EFE-4F8A-AA55-30386A3F5686
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\86227D9C-0EFE-4F8A-AA55-30386A3F5686
Maxifiles clickpix toolbar - *ND, 2 registry entries.
R=HKCR\Interface\0d5cc8ae-0bb0-49c3-ba33-ba4508ea43cc
powerscan - *D, 1 registry entry, 2 files.
R=HKLM\software\microsoft\windows\currentversion\uninstall
\powerscan\
F=TIF\power_remove[1].exe
F=TIF\powerscan[1].exe
bho_sidefind - *D, 3 registry entries, 1 DLL files.
R=HKCR\interface\339d8aff-0b42-3260-ad82-78ce605a9543
R=HKCR\interface\a36a5936-cfd9-4b41-86bd-319a1931887f
R=HKCR\typelib\58634367-d62b-4c2c-86be-5aac45cdb671
F=TIF\sidefind13[1].dll
yoursitebar - *D, 8 registry entries.
R=HKCR\interface\03b800f9-2536-4441-8cda-2a3e6d15b4f8
R=HKCR\interface\dfbcc1eb-b149-487e-80c1-cc1562021542
R=HKCR\typelib\4ee12b71-aa5e-45ec-8666-2db3ad3fdf44
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\42F2C9BA-614F-47C0-B3E3-ECFD34EED658
XXXToolBar.com - *ND, 1 cookie not removed.
C=david patchen@xxxtoolbar[2].txt
SPecific 911 Hijack go2net.com - *ND, 1 cookie.
C=davidpatchen@go2net[1].txt
Common Components Unrelated
R=HKCU\Software\Microsoft\Internet
Explorer\Extensions\CmdMapping\10E42047-DEB9-4535-A118-
B3F6EC39B807
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\10E42047-DEB9-4535-A118-B3F6EC39B807
MediaPass - *ND, 1 Registry Entry.
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6
Lop.COm - *ND, 1 URL File
F=FAV\adult\fetish.url
HotSearchBar *ND, 31 INK Files.
F=FAV\Fun & Games\Betting.Ink
F=FAV\Fun & Games\Casino Palace.Ink
F=FAV\Fun & Games\Casino.Ink
F=FAV\Fun & Games\Games.Ink
F=FAV\Fun & Games\Horoscope.Ink
F=FAV\Going Places\Air Tickets.Ink
F=FAV\Going Places\Car Rentals.Ink
F=FAV\Going Places\Hotel Deals.Ink
F=FAV\Going Places\Luggage.Ink
F=FAV\Going Places\Travel.Ink
F=FAV\Living\Dating.Ink
F=FAV\Living\Find a Degree.Ink
F=FAV\Living\Find a JOb.Ink
F=FAV\Living\Home.Ink
F=FAV\Living\Insurance.Ink
F=FAV\Shop\Auctions.Ink
F=FAV\Shop\Books.Ink
F=FAV\Shop\Computers.Ink
F=FAV\Shop\Discount.Ink
F=FAV\Shop\Flowers.Ink
F=FAV\Shop\Golf.Ink
F=FAV\Shop\Jewelry.Ink
F=FAV\Shop\Movies.Ink
F=FAV\Shop\Music.Ink
F=FAV\Shop\Online Store.Ink
F=FAV\Shop\Perfume.Ink
F=FAV\Shop\Sleepwear.Ink
F=FAV\Technology\Adware Remover.Ink
F=FAV\Technology\Anti-Virus.Ink
F=FAV\Technology\PC Cleaner.Ink
F=FAV\Technology\Tech & gadgets.Ink
sahAgent - *ND, 1 EXE File
NOTE: Incorrectly Identified, this is part of Kodak
Picture Easy.
F=PEZTwain.EXE
WebRoot Spy Sweeper (Demo available at
www.spysweeper.cOM) detected xx items not removed
by AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
AZESearch - *D, 19 registry entries, 1 XML file, 2 DLL
files, 1 BMP file, 1 CAB file.
R=HKCR\AddressBar.Loader
R=HKCR\AddressBar.Loader.1
R=HKCR\CLSID\f65b197f-8260-4d52-909a-f70118e646eb
R=HKCR\Interface\636FF82A-830A-42EA-938B-6DC78B2AC30C
R=HKCR\Interface\A55C3BA7-DB1E-4652-867E-055CEAFE8018
R=HKCR\Interface\EF77D50B-5767-4E0E-A3A4-098670025F1D
R=HKCR\TypeLib\42FC3840-020C-4E93-A34C-4DF1A6330FBB
R=HKCR\TypeLib\DEA43CE3-D57B-45F6-A4D1-110E652CED11
R=HKCU\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser
R=HKLM\SOFTWARE\AZESearchCo
R=HKLM\SOFTWARE\Classes\AddressBar.Loader
R=HKLM\SOFTWARE\Classes\AddressBar.Loader.1
R=HKLM\SOFTWARE\Classes\CLSID\f65b197f-8260-4d52-909a-
f70118e646eb
R=HKLM\SOFTWARE\Classes\Interface\636FF82A-830A-42EA-938B-
6DC78B2AC30C
R=HKLM\SOFTWARE\Classes\Interface\A55C3BA7-DB1E-4652-867E-
055CEAFE8018
R=HKLM\SOFTWARE\Classes\Interface\EF77D50B-5767-4E0E-A3A4-
098670025F1D
R=HKLM\SOFTWARE\Classes\TypeLib\42FC3840-020C-4E93-A34C-
4DF1A6330FBB
R=HKLM\SOFTWARE\Classes\TypeLib\DEA43CE3-D57B-45F6-A4D1-
110E652CED11
R=HKLM\SOFTWARE\LoaderCo
F=SYSazebar.xml
F=SYSiasada.dll
F=TIF\azesearch[1].bmp
F=TIF\azentretien[1].dll
F=TIF\azesearch[1].cab
Bargain buddy - *D as cashback part of Bargain buddy, 6
registry entries, 2 EXE Files.
R=HKCR\Interface\8eee58d5-130e-4cbd-9c83-35a0564e5678
R=HKCR\Interface\c6906a23-4717-4e1f-b6fd-f063bed5678
R=HKLM\SOFTWARE\Classes\Interface\8eee58d5-130e-4cbd-9c83-
35a0564e5678
R=HKLM\SOFTWARE\Classes\Interface\c6906a23-4717-4e1f-b6fd-
f063bed5678
R=HKLM\SOFTWARE\Classes\typelib\4eb7bbe8-2e15-424b-9ddb-
2cdb9516b2c3
R=HKCR\typelib\4eb7bbe8-2e15-424b-9ddb-2cdb9516b2c3
F=TIF\bb[1].exe
F=TIF\package_marketing27[1].exe
blazefind_adstat - *ND, 2 registry entries, & 1 DLL file.
R=HKCR\adstatservx.installer\
R=HKLM\software\classes\adstatservx.installer\
F=c:\windows\downloaded program files\adstatservx.dll
bonzi buddy - *ND, 4 registry entries.
R=HKCR\Interface\4bb35a55-a91a-11cf-ba7c-00a0d1001a5a
R=HKCR\Interface\244d13bb-afdb-11ce-85d1-00aa00695286
R=HKCR\Interface\f2a97fa2-714d-11cf-ba24-00a0d1001a5a
RekKey = HKLM\software\classes\interface\4bb35a55-a91a-
11cf-ba7c-00a0d1001a5a
clickpix toolbar - *ND, 2 registry entries.
R=HKCR\Interface\0d5cc8ae-0bb0-49c3-ba33-ba4508ea43cc
R=HKLM\software\classes\interface\0d5cc8ae-0bb0-49c3-ba33-
ba4508ea43cc
dapsol dialer - *ND, 1 registry entry.
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet Explorer\Main\conc
internetoptimiser - *ND, 3 registry entries, 1 EXE file.
R=HKLM\software\microsoft\windows\currentversion\policies\
ameopt
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\policies\avenue media
R=HKLM\software\policies\avenue media\
F=TIF\optimize[1].exe
navisearch - *ND, 6 Registry entries.
R=HKCR\Interface\8eee58d5-130e-4cdb-9c83-35a0564e5678
R=HKCR\Interface\c6906a23-4717-4e1f-b6fd-f06ebed15678
RekKey = HKLM\software\classes\interface\8eee58d5-130e-
4cdb-9c83-35a0564e5678
RekKey = HKLM\software\classes\interface\c6906a23-4717-
4e1f-b6fd-f06ebed15678
RekKey = HKLM\software\classes\typelib\4eb7bbe8-2e15-424b-
9ddb-2cdb9516b2c3
R=HKCR\typelib\4eb7bbe8-2e15-424b-9ddb-2cdb9516b2c3
1800search assistant - *D, 4 Registry entries, 1 folder,
1 file.
R=HKCR\clsid\0ac49246-419b-4ee0-8917-8818daad6a4e
R=HKCR\ncmyb.sabho\
R=HKLM\software\classes\clsid\0ac49246-419b-4ee0-8917-
8818daad6a4e
R=HKLM\software\classes\ncmyb.sabho\
Folder = all users\start menu\programs\180search assistant
F=c:\program files\microsoft
antispyware\quarantine\a9988bff-e119-48c1-b905-ad0c26
\4c599ceb-a203-4755-b324-005bac
powerscan - *D, 1 registry entry, 2 files.
R=HKLM\software\microsoft\windows\currentversion\uninstall
\powerscan\
F=TIF\power_remove[1].exe
F=TIF\powerscan[1].exe
searchit toolbar - *ND, 3 registry entries.
R=HKLM\software\classes\toolband.toolhelper.1\
R=HKLM\software\classes\toolband.toolhelper\
R=HKCR\toolband.toolhelper\
bho_sidefind - *D, 9 registry entries, 1 EXE file, & 2
DLL files.
R=HKCR\interface\339d8aff-0b42-3260-ad82-78ce605a9543
R=HKCR\interface\a36a5936-cfd9-4b41-86bd-319a1931887f
R=HKLM\software\classes\interface\339d8aff-0b42-3260-ad82-
78ce605a9543
R=HKLM\software\classes\interface\a36a5936-cfd9-4b41-86bd-
319a1931887f
R=HKLM\software\classes\typelib\58634367-d62b-4c2c-86be-
5aac45cdb671
R=HKLM\software\classes\typelib\d0288a41-9855-4a9b-8316-
babe243648da
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet
Explorer\Extensions\CmdMapping\10E42047-DEB9-4535-A118-
B3F6EC39B807
R=HKCR\typelib\58634367-d62b-4c2c-86be-5aac45cdb671
R=HKCR\typelib\d0288a41-9855-4a9b-8316-babe243648da
F=TIF\sidefind[1].exe
F=TIF\sidefind13[1].dll
F=TIF\sfbho[1].dll
winad - *ND, 1 registry entry.
R=HKLM\SOFTWARE\adstatus service\
yoursitebar - *D, 8 registry entries, 1 DLL file.
R=HKCR\interface\03b800f9-2536-4441-8cda-2a3e6d15b4f8
R=HKCR\interface\dfbcc1eb-b149-487e-80c1-cc1562021542
R=HKLM\software\classes\interface\03b800f9-2536-4441-8cda-
2a3e6d15b4f8
R=HKLM\software\classes\interface\dfbcc1eb-b149-487e-80c1-
cc1562021542
R=HKLM\software\classes\typelib\4ee12b71-aa5e-45ec-8666-
2db3ad3fdf44
R=HKLM\software\microsoft\internet
explorer\toolbar\86227D9C-0EFE-4f8a-AA55-30386A3F5686
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet
Explorer\toolbar\webbrowser\86227D9C-0EFE-4F8A-AA55-
30386A3F5686
R=HKCR\typelib\4ee12b71-aa5e-45ec-8666-2db3ad3fdf44
F=TIF\ysb[1].dll
zango - *D, 4 registry entries.
R=HKLM\SOFTWARE\Classes\TypeLib\5b6689b5-c2d4-4dc7-bfd1-
24ac17e5fcda
R=HKLM\SOFTWARE\Classes\TypeLib\68bf4626-d66b-4383-a6af-
62e57e9b6cd4
R=HKCR\typelib\5b6689b5-c2d4-4dc7-bfd1-24ac17e5fcda
R=HKCR\typelib\68bf4626-d66b-4383-a6af-62e57e9b6cd4
sandboxer - *ND, 2 cookies.
C=davidpatchen@0[1].txt
C=davidpatchen@0[2].txt
2o7.net - *ND, 2 cookies.
[email protected][1].txt
C=davidpatchen@2o7[1].txt
6425137 - *ND, 1 Cookie.
C=davidpatchen@6425137[2].txt
66.246.209 - *ND, 1 cookie.
[email protected][2].txt
80503492 - *ND, 1 cookie.
C=davidpatchen@80503492[1].txt
yieldmanager - *ND, 1 cookie.
[email protected][1].txt
advertising - *ND, 1 cookie.
C=davidpatchen@advertising[1].txt
apmebf - *ND, 1 cookie.
C=davidpatchen@apmebf[1].txt
ask - *ND, 1 cookie.
C=davidpatchen@ask[1].txt
atlas dmt - *ND, 1 cookie.
C=davidpatchen@atdmt[1].txt
adwola - *ND, 1 cookie.
C=davidpatchen@atwola[1].txt
azjmp - *ND, 1 cookie.
C=davidpatchen@azjmp[1].txt
enhance - *ND, 1 cookie.
[email protected][2].txt
goclick - *ND, 1 cookie.
[email protected][1].txt
clickbank - *ND, 1 cookie.
C=davidpatchen@clickbank[2].txt
com.com - *ND, 1 cookie.
C=davidpatchen@com[2].txt
sextracker - *ND, 3 cookies.
[email protected][1].txt
[email protected][1].txt
C=davidpatchen@sextracker[2].txt
ru4 - *ND, 1 cookie.
[email protected][2].txt
go2net.com - *ND, 1 cookie.
C=davidpatchen@go2net[1].txt
metareward.com - *ND, 1 cookie.
C=davidpatchen@metareward[2].txt
aptimus - *ND, 1 cookie.
[email protected][1].txt
nuker - *ND, 1 cookie.
C=davidpatchen@nuker[2].txt
overture - *ND, 2 cookies.
C=davidpatchen@overture[1].txt
C=davidpatchen@perf_overture[1].txt
rightmedia - *ND, 1 cookie.
C=davidpatchen@rightmedia[2].txt
server.iad.liveperson - *ND, 1 cookie.
[email protected][2].txt
serving-sys - *ND, 1 cookie.
C=davidpatchen@serving-sys[1].txt
spylog - *ND, 1 cookie.
C=davidpatchen@spylog[2].txt
stopzila - *ND, 1 cookie.
[email protected][2].txt
xxxtoolbar - *ND, 1 cookie.
C=davidpatchen@xxxtoolbar[2].txt
uadro - *ND, 1 cookie.
C=davidpatchen@yadro[1].txt
ysbweb - *ND, 1 cookie.
C=davidpatchen@yadro[1].txt
hookdump - *ND, 1 EXE File.
F=SYShookdump.exe
istbar - *D, 2 EXE files.
F=TIF\istecover[1].exe
F=TIF\istsvc[1].exe
java byteveriry - *ND, 1 JAR file.
F=TIF\classload[1].jar
moneytree - *D, 1 DLL file.
F=TIF\nem220[1].dll
amquiro toolbar - *ND, 1 BMP file.
F=c:\program files\torrent search ie toolbar\nav.bmp
sexfiles fialers - *ND, 1 INK file.
F=FAV\living\dating.Ink
found spyware. I ran the following
applications to find out how effective the Microsoft
AntiSpyware application was. The
Following specifies the Application used and The Items
either missed by AntiSpyware's
removal process or not detected by AntiSpyware at all.
Some items are redundant between
other spyware programs run.
Referances *ND=Not Detected by AntiSpyware at all.
*D=Detected by AntiSpyware and Removed
but items were still found.
HKCR=HKEY_CLASSES_ROOT
HKLM=HKEY_LOCAL_MACHINE
HKCU=HKEY_CURRENT_USER
HKU=HKEY_USERS
SYS=C:\Windows\System32\
TIF=Temp Internet Files Directory
FAV=Favorites Directory
R=RegKey Entry
F=File Name
c=Cookie File
AntiVirus Gold V2.0 (Demo available at
www.antivirusgold.com) detected 36 items not removed
by AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
AZESearch - *D, 19 registry entries, 1 XML file, & 1 DLL
file
R=HKCR\AddressBar.Loader
R=HKCR\AddressBar.Loader.1
R=HKCR\CLSID\f65b197f-8260-4d52-909a-f70118e646eb
R=HKCR\Interface\636FF82A-830A-42EA-938B-6DC78B2AC30C
R=HKCR\Interface\A55C3BA7-DB1E-4652-867E-055CEAFE8018
R=HKCR\Interface\EF77D50B-5767-4E0E-A3A4-098670025F1D
R=HKCR\TypeLib\42FC3840-020C-4E93-A34C-4DF1A6330FBB
R=HKCR\TypeLib\DEA43CE3-D57B-45F6-A4D1-110E652CED11
R=HKCU\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser
R=HKLM\SOFTWARE\AZESearchCo
R=HKLM\SOFTWARE\Classes\AddressBar.Loader
R=HKLM\SOFTWARE\Classes\AddressBar.Loader.1
R=HKLM\SOFTWARE\Classes\CLSID\f65b197f-8260-4d52-909a-
f70118e646eb
R=HKLM\SOFTWARE\Classes\Interface\636FF82A-830A-42EA-938B-
6DC78B2AC30C
R=HKLM\SOFTWARE\Classes\Interface\A55C3BA7-DB1E-4652-867E-
055CEAFE8018
R=HKLM\SOFTWARE\Classes\Interface\EF77D50B-5767-4E0E-A3A4-
098670025F1D
R=HKLM\SOFTWARE\Classes\TypeLib\42FC3840-020C-4E93-A34C-
4DF1A6330FBB
R=HKLM\SOFTWARE\Classes\TypeLib\DEA43CE3-D57B-45F6-A4D1-
110E652CED11
R=HKLM\SOFTWARE\\LoaderCo
F=SYSazebar.xml
F=SYSiasada.dll
YourSiteBar - *D, 2 registry entries.
R=HKCU\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser
R=HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar
CoolWebSearch-MW Search, 1 registry entry.
R=HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar
Battler.Batch - *ND, 1 registry entry
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
System
Hosts.hijacker - *D, 1 file.
F=Location www.teen-biz.com
ADTMT.com - *ND, 1 cookie.
C=david patchen@atdmt[1].txt
ClickBank - *ND, 1 cookie .
C=david patchen@clickbank[2].txt
goClick - *ND, 1 cookie.
C=david (e-mail address removed)[1].txt
Overture.com - *ND, 2 cookies.
C=david patchen@overture[1].txt
C=david (e-mail address removed)[1].txt
SexTracker.com - *ND, 3 cookies.
C=david (e-mail address removed)[1].txt
C=david (e-mail address removed)[1].txt
C=david patchen@sextracker[2].txt
SpyLog.com - *ND, 1 cookie.
C=david patchen@spylog[2].txt
XXXToolBar.com - *ND, 1 cookie not removed.
C=david patchen@xxxtoolbar[2].txt
Spyware Killa (Freeware available at
www.SpywareKilla.com) detected 9 items not removed by
AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
Hotbar - *ND, 1 registry entry.
R=HKLM\System\currentcontrolset\control\deviceCLASSES\
fd0af4-b41d-11d2-9c95-00c004f7971e0
sextracker - *ND, 1 cookies.
C=sextracker.
VX2 - *ND, 1 cookie.
C=itc.
WildTangent - *ND, 1 cookie.
C=Wildtangent.
Aureate - *ND, 1 TLB file.
NOTE: This should have not been detected as it is the
type library for activemovie.
F=amcompat.tlb
DownloadWare - *ND, 1 DLL file.
NOTE: This should have not been detected as it is part of
Microsoft Train Simulator.
F=dw.exe
FlashTrack - *ND, 1 DLL file.
NOTE: This This should have not been detected as it is
part of 3D Studio Max.
F=flt.dll
PCTools Spyware Doctor (Demo avialable at
www.pctools.com) detected xx items not removed by
AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
AZESearch Toolbar - *D, 16 Registry Entries, 1 BMP File,
& 1 DLL file.
R=HKCR\AddressBar.Loader
R=HKCR\AddressBar.Loader.1
R=HKCR\Interface\38252777-2500-456E-8B3D-A55850306DA2
R=HKCR\Interface\636FF82A-830A-42EA-938B-6DC78B2AC30C
R=HKCR\Interface\A55C3BA7-DB1E-4652-867E-055CEAFE8018
R=HKCR\TypeLib\42FC3840-020C-4E93-A34C-4DF1A6330FBB
R=HKCR\TypeLib\DEA43CE3-D57B-45F6-A4D1-110E652CED11
R=HKLM\SOFTWARE\AZESearchCo
R=HKLM\SOFTWARE\LoaderCo
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\0D2DEF3A-F4F1-42EC-AC4F-132E7BA6E292
R=HKLM\SOFTWARE\Microsoft\Internet
Explorer\Toolbar\A19EF336-01D4-48E6-926A-FE7E1C747AED
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\A19EF336-01D4-48E6-926A-FE7E1C747AED
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\DA7FF3F8-08BE-4CAC-BC00-94D91C6AE7F4
R=HKCR\CLSID\f65b197f-8260-4d52-909a-f70118e646eb
R=HKLM\SOFTWARE\Classes\CLSID\f65b197f-8260-4d52-909a-
f70118e646eb
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\f65b197f-8260-4d52-909a-f70118e646eb
f=TIF\azesearch[1].bmp
f=TIF\azentretien[1].dll
1800search assistant - *D, 6 Registry Entries, 1
Directory File.
R=HKCR\CLSID\0AC49246-419B-4EE0-8917-8818DAAD6A4E
R=HKLM\SOFTWARE\Classes\CLSID\0AC49246-419B-4EE0-8917-
8818DAAD6A4E
R=HKCR\Interface\2B0ECEAC-F597-4858-A542-D966B49055B9
R=HKCR\Interface\DDEA2E1D-8555-45E5-AF09-EC9AA4EA27AD
R=HKCR\Interface\F1F1E775-1B21-454D-8D38-&C16519969E5
R=HKCR\TypeLib\5B6689B5-C2D4-4DC7-BFD1-24AC17E5FCDA
F=All Users\Start Menu\Programs\180Search Assistant
Internet Optimizer-Avenue Media - *ND, 7 Registry
Entries, 2 files.
R=HKLM\software\policies\avenue media\
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\policies\avenue media
R=HKLM\SOFTWARE\Microsoft\INternet Explorer\Main\BandRest
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet Explorer\Main\BandRest
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
AMeOpt
R=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
AMeOpt
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\00000010-6F7D-93E3-4A4827C2E4C8
F=TIF\optimize[1].exe
F=TIF\nem220[1].dll
istbar - *D, 1 Registry Entry, 1 Cookie, 1 EXE File
R=HKCR\TypeLib\D0288A41-9855-4A9B-8316-BABE243648DA
C=david patchen@ysbweb[1].txt
F=TIF\istrecover[1].exe
dapsol dialer - *ND, 1 registry entry.
R=HKCU\Software\Microsoft\Internet Explorer\Main\conc
Exact advertising Bargain buddy - *D as Cashback, 4
Registry Entries, 2 EXE Files.
R=HKCR\Interface\8EEE58D5-130E-4CBD-9C83-35A0564E5678
R=HKCR\Interface\C6906A23-4717-4E1F-B6FD-F06EBED15678
R=HKCR\TypeLib\4EB7BBE8-2E15-424B-9DDB-2CDB9516B2C3
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\F4E04583-354E-4076-BE7D-ED6A80FD66DA
F=TIF\bb[1].exe
F=TIF\package_marketing27[1].exe
Jraun - *ND, 4 Registy Entries.
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser\86227D9C-0EFE-4F8A-AA55-
30386A3F5686
R=HKLM\SOFTWARE\Microsoft\INternet
Explorer\Toolbar\86227D9C-0EFE-4F8A-AA55-30386A3F5686
R=HKLM\SOFTWARE\Microsoft\INternet
Explorer\WebBrowser\86227D9C-0EFE-4F8A-AA55-30386A3F5686
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\86227D9C-0EFE-4F8A-AA55-30386A3F5686
Maxifiles clickpix toolbar - *ND, 2 registry entries.
R=HKCR\Interface\0d5cc8ae-0bb0-49c3-ba33-ba4508ea43cc
powerscan - *D, 1 registry entry, 2 files.
R=HKLM\software\microsoft\windows\currentversion\uninstall
\powerscan\
F=TIF\power_remove[1].exe
F=TIF\powerscan[1].exe
bho_sidefind - *D, 3 registry entries, 1 DLL files.
R=HKCR\interface\339d8aff-0b42-3260-ad82-78ce605a9543
R=HKCR\interface\a36a5936-cfd9-4b41-86bd-319a1931887f
R=HKCR\typelib\58634367-d62b-4c2c-86be-5aac45cdb671
F=TIF\sidefind13[1].dll
yoursitebar - *D, 8 registry entries.
R=HKCR\interface\03b800f9-2536-4441-8cda-2a3e6d15b4f8
R=HKCR\interface\dfbcc1eb-b149-487e-80c1-cc1562021542
R=HKCR\typelib\4ee12b71-aa5e-45ec-8666-2db3ad3fdf44
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\42F2C9BA-614F-47C0-B3E3-ECFD34EED658
XXXToolBar.com - *ND, 1 cookie not removed.
C=david patchen@xxxtoolbar[2].txt
SPecific 911 Hijack go2net.com - *ND, 1 cookie.
C=davidpatchen@go2net[1].txt
Common Components Unrelated
R=HKCU\Software\Microsoft\Internet
Explorer\Extensions\CmdMapping\10E42047-DEB9-4535-A118-
B3F6EC39B807
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\10E42047-DEB9-4535-A118-B3F6EC39B807
MediaPass - *ND, 1 Registry Entry.
R=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
\15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6
Lop.COm - *ND, 1 URL File
F=FAV\adult\fetish.url
HotSearchBar *ND, 31 INK Files.
F=FAV\Fun & Games\Betting.Ink
F=FAV\Fun & Games\Casino Palace.Ink
F=FAV\Fun & Games\Casino.Ink
F=FAV\Fun & Games\Games.Ink
F=FAV\Fun & Games\Horoscope.Ink
F=FAV\Going Places\Air Tickets.Ink
F=FAV\Going Places\Car Rentals.Ink
F=FAV\Going Places\Hotel Deals.Ink
F=FAV\Going Places\Luggage.Ink
F=FAV\Going Places\Travel.Ink
F=FAV\Living\Dating.Ink
F=FAV\Living\Find a Degree.Ink
F=FAV\Living\Find a JOb.Ink
F=FAV\Living\Home.Ink
F=FAV\Living\Insurance.Ink
F=FAV\Shop\Auctions.Ink
F=FAV\Shop\Books.Ink
F=FAV\Shop\Computers.Ink
F=FAV\Shop\Discount.Ink
F=FAV\Shop\Flowers.Ink
F=FAV\Shop\Golf.Ink
F=FAV\Shop\Jewelry.Ink
F=FAV\Shop\Movies.Ink
F=FAV\Shop\Music.Ink
F=FAV\Shop\Online Store.Ink
F=FAV\Shop\Perfume.Ink
F=FAV\Shop\Sleepwear.Ink
F=FAV\Technology\Adware Remover.Ink
F=FAV\Technology\Anti-Virus.Ink
F=FAV\Technology\PC Cleaner.Ink
F=FAV\Technology\Tech & gadgets.Ink
sahAgent - *ND, 1 EXE File
NOTE: Incorrectly Identified, this is part of Kodak
Picture Easy.
F=PEZTwain.EXE
WebRoot Spy Sweeper (Demo available at
www.spysweeper.cOM) detected xx items not removed
by AntiSpyware as Follows.
----------------------------------------------------------
---------------------------------
AZESearch - *D, 19 registry entries, 1 XML file, 2 DLL
files, 1 BMP file, 1 CAB file.
R=HKCR\AddressBar.Loader
R=HKCR\AddressBar.Loader.1
R=HKCR\CLSID\f65b197f-8260-4d52-909a-f70118e646eb
R=HKCR\Interface\636FF82A-830A-42EA-938B-6DC78B2AC30C
R=HKCR\Interface\A55C3BA7-DB1E-4652-867E-055CEAFE8018
R=HKCR\Interface\EF77D50B-5767-4E0E-A3A4-098670025F1D
R=HKCR\TypeLib\42FC3840-020C-4E93-A34C-4DF1A6330FBB
R=HKCR\TypeLib\DEA43CE3-D57B-45F6-A4D1-110E652CED11
R=HKCU\Software\Microsoft\Internet
Explorer\Toolbar\WebBrowser
R=HKLM\SOFTWARE\AZESearchCo
R=HKLM\SOFTWARE\Classes\AddressBar.Loader
R=HKLM\SOFTWARE\Classes\AddressBar.Loader.1
R=HKLM\SOFTWARE\Classes\CLSID\f65b197f-8260-4d52-909a-
f70118e646eb
R=HKLM\SOFTWARE\Classes\Interface\636FF82A-830A-42EA-938B-
6DC78B2AC30C
R=HKLM\SOFTWARE\Classes\Interface\A55C3BA7-DB1E-4652-867E-
055CEAFE8018
R=HKLM\SOFTWARE\Classes\Interface\EF77D50B-5767-4E0E-A3A4-
098670025F1D
R=HKLM\SOFTWARE\Classes\TypeLib\42FC3840-020C-4E93-A34C-
4DF1A6330FBB
R=HKLM\SOFTWARE\Classes\TypeLib\DEA43CE3-D57B-45F6-A4D1-
110E652CED11
R=HKLM\SOFTWARE\LoaderCo
F=SYSazebar.xml
F=SYSiasada.dll
F=TIF\azesearch[1].bmp
F=TIF\azentretien[1].dll
F=TIF\azesearch[1].cab
Bargain buddy - *D as cashback part of Bargain buddy, 6
registry entries, 2 EXE Files.
R=HKCR\Interface\8eee58d5-130e-4cbd-9c83-35a0564e5678
R=HKCR\Interface\c6906a23-4717-4e1f-b6fd-f063bed5678
R=HKLM\SOFTWARE\Classes\Interface\8eee58d5-130e-4cbd-9c83-
35a0564e5678
R=HKLM\SOFTWARE\Classes\Interface\c6906a23-4717-4e1f-b6fd-
f063bed5678
R=HKLM\SOFTWARE\Classes\typelib\4eb7bbe8-2e15-424b-9ddb-
2cdb9516b2c3
R=HKCR\typelib\4eb7bbe8-2e15-424b-9ddb-2cdb9516b2c3
F=TIF\bb[1].exe
F=TIF\package_marketing27[1].exe
blazefind_adstat - *ND, 2 registry entries, & 1 DLL file.
R=HKCR\adstatservx.installer\
R=HKLM\software\classes\adstatservx.installer\
F=c:\windows\downloaded program files\adstatservx.dll
bonzi buddy - *ND, 4 registry entries.
R=HKCR\Interface\4bb35a55-a91a-11cf-ba7c-00a0d1001a5a
R=HKCR\Interface\244d13bb-afdb-11ce-85d1-00aa00695286
R=HKCR\Interface\f2a97fa2-714d-11cf-ba24-00a0d1001a5a
RekKey = HKLM\software\classes\interface\4bb35a55-a91a-
11cf-ba7c-00a0d1001a5a
clickpix toolbar - *ND, 2 registry entries.
R=HKCR\Interface\0d5cc8ae-0bb0-49c3-ba33-ba4508ea43cc
R=HKLM\software\classes\interface\0d5cc8ae-0bb0-49c3-ba33-
ba4508ea43cc
dapsol dialer - *ND, 1 registry entry.
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet Explorer\Main\conc
internetoptimiser - *ND, 3 registry entries, 1 EXE file.
R=HKLM\software\microsoft\windows\currentversion\policies\
ameopt
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\policies\avenue media
R=HKLM\software\policies\avenue media\
F=TIF\optimize[1].exe
navisearch - *ND, 6 Registry entries.
R=HKCR\Interface\8eee58d5-130e-4cdb-9c83-35a0564e5678
R=HKCR\Interface\c6906a23-4717-4e1f-b6fd-f06ebed15678
RekKey = HKLM\software\classes\interface\8eee58d5-130e-
4cdb-9c83-35a0564e5678
RekKey = HKLM\software\classes\interface\c6906a23-4717-
4e1f-b6fd-f06ebed15678
RekKey = HKLM\software\classes\typelib\4eb7bbe8-2e15-424b-
9ddb-2cdb9516b2c3
R=HKCR\typelib\4eb7bbe8-2e15-424b-9ddb-2cdb9516b2c3
1800search assistant - *D, 4 Registry entries, 1 folder,
1 file.
R=HKCR\clsid\0ac49246-419b-4ee0-8917-8818daad6a4e
R=HKCR\ncmyb.sabho\
R=HKLM\software\classes\clsid\0ac49246-419b-4ee0-8917-
8818daad6a4e
R=HKLM\software\classes\ncmyb.sabho\
Folder = all users\start menu\programs\180search assistant
F=c:\program files\microsoft
antispyware\quarantine\a9988bff-e119-48c1-b905-ad0c26
\4c599ceb-a203-4755-b324-005bac
powerscan - *D, 1 registry entry, 2 files.
R=HKLM\software\microsoft\windows\currentversion\uninstall
\powerscan\
F=TIF\power_remove[1].exe
F=TIF\powerscan[1].exe
searchit toolbar - *ND, 3 registry entries.
R=HKLM\software\classes\toolband.toolhelper.1\
R=HKLM\software\classes\toolband.toolhelper\
R=HKCR\toolband.toolhelper\
bho_sidefind - *D, 9 registry entries, 1 EXE file, & 2
DLL files.
R=HKCR\interface\339d8aff-0b42-3260-ad82-78ce605a9543
R=HKCR\interface\a36a5936-cfd9-4b41-86bd-319a1931887f
R=HKLM\software\classes\interface\339d8aff-0b42-3260-ad82-
78ce605a9543
R=HKLM\software\classes\interface\a36a5936-cfd9-4b41-86bd-
319a1931887f
R=HKLM\software\classes\typelib\58634367-d62b-4c2c-86be-
5aac45cdb671
R=HKLM\software\classes\typelib\d0288a41-9855-4a9b-8316-
babe243648da
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet
Explorer\Extensions\CmdMapping\10E42047-DEB9-4535-A118-
B3F6EC39B807
R=HKCR\typelib\58634367-d62b-4c2c-86be-5aac45cdb671
R=HKCR\typelib\d0288a41-9855-4a9b-8316-babe243648da
F=TIF\sidefind[1].exe
F=TIF\sidefind13[1].dll
F=TIF\sfbho[1].dll
winad - *ND, 1 registry entry.
R=HKLM\SOFTWARE\adstatus service\
yoursitebar - *D, 8 registry entries, 1 DLL file.
R=HKCR\interface\03b800f9-2536-4441-8cda-2a3e6d15b4f8
R=HKCR\interface\dfbcc1eb-b149-487e-80c1-cc1562021542
R=HKLM\software\classes\interface\03b800f9-2536-4441-8cda-
2a3e6d15b4f8
R=HKLM\software\classes\interface\dfbcc1eb-b149-487e-80c1-
cc1562021542
R=HKLM\software\classes\typelib\4ee12b71-aa5e-45ec-8666-
2db3ad3fdf44
R=HKLM\software\microsoft\internet
explorer\toolbar\86227D9C-0EFE-4f8a-AA55-30386A3F5686
R=HKU\S-1-5-21-527237240-113007714-1957994488-1003
\Software\Microsoft\Internet
Explorer\toolbar\webbrowser\86227D9C-0EFE-4F8A-AA55-
30386A3F5686
R=HKCR\typelib\4ee12b71-aa5e-45ec-8666-2db3ad3fdf44
F=TIF\ysb[1].dll
zango - *D, 4 registry entries.
R=HKLM\SOFTWARE\Classes\TypeLib\5b6689b5-c2d4-4dc7-bfd1-
24ac17e5fcda
R=HKLM\SOFTWARE\Classes\TypeLib\68bf4626-d66b-4383-a6af-
62e57e9b6cd4
R=HKCR\typelib\5b6689b5-c2d4-4dc7-bfd1-24ac17e5fcda
R=HKCR\typelib\68bf4626-d66b-4383-a6af-62e57e9b6cd4
sandboxer - *ND, 2 cookies.
C=davidpatchen@0[1].txt
C=davidpatchen@0[2].txt
2o7.net - *ND, 2 cookies.
[email protected][1].txt
C=davidpatchen@2o7[1].txt
6425137 - *ND, 1 Cookie.
C=davidpatchen@6425137[2].txt
66.246.209 - *ND, 1 cookie.
[email protected][2].txt
80503492 - *ND, 1 cookie.
C=davidpatchen@80503492[1].txt
yieldmanager - *ND, 1 cookie.
[email protected][1].txt
advertising - *ND, 1 cookie.
C=davidpatchen@advertising[1].txt
apmebf - *ND, 1 cookie.
C=davidpatchen@apmebf[1].txt
ask - *ND, 1 cookie.
C=davidpatchen@ask[1].txt
atlas dmt - *ND, 1 cookie.
C=davidpatchen@atdmt[1].txt
adwola - *ND, 1 cookie.
C=davidpatchen@atwola[1].txt
azjmp - *ND, 1 cookie.
C=davidpatchen@azjmp[1].txt
enhance - *ND, 1 cookie.
[email protected][2].txt
goclick - *ND, 1 cookie.
[email protected][1].txt
clickbank - *ND, 1 cookie.
C=davidpatchen@clickbank[2].txt
com.com - *ND, 1 cookie.
C=davidpatchen@com[2].txt
sextracker - *ND, 3 cookies.
[email protected][1].txt
[email protected][1].txt
C=davidpatchen@sextracker[2].txt
ru4 - *ND, 1 cookie.
[email protected][2].txt
go2net.com - *ND, 1 cookie.
C=davidpatchen@go2net[1].txt
metareward.com - *ND, 1 cookie.
C=davidpatchen@metareward[2].txt
aptimus - *ND, 1 cookie.
[email protected][1].txt
nuker - *ND, 1 cookie.
C=davidpatchen@nuker[2].txt
overture - *ND, 2 cookies.
C=davidpatchen@overture[1].txt
C=davidpatchen@perf_overture[1].txt
rightmedia - *ND, 1 cookie.
C=davidpatchen@rightmedia[2].txt
server.iad.liveperson - *ND, 1 cookie.
[email protected][2].txt
serving-sys - *ND, 1 cookie.
C=davidpatchen@serving-sys[1].txt
spylog - *ND, 1 cookie.
C=davidpatchen@spylog[2].txt
stopzila - *ND, 1 cookie.
[email protected][2].txt
xxxtoolbar - *ND, 1 cookie.
C=davidpatchen@xxxtoolbar[2].txt
uadro - *ND, 1 cookie.
C=davidpatchen@yadro[1].txt
ysbweb - *ND, 1 cookie.
C=davidpatchen@yadro[1].txt
hookdump - *ND, 1 EXE File.
F=SYShookdump.exe
istbar - *D, 2 EXE files.
F=TIF\istecover[1].exe
F=TIF\istsvc[1].exe
java byteveriry - *ND, 1 JAR file.
F=TIF\classload[1].jar
moneytree - *D, 1 DLL file.
F=TIF\nem220[1].dll
amquiro toolbar - *ND, 1 BMP file.
F=c:\program files\torrent search ie toolbar\nav.bmp
sexfiles fialers - *ND, 1 INK file.
F=FAV\living\dating.Ink