dwp

Volunteer Security Advisor
  • Content Count

    15
  • Joined

  • Last visited

Community Reputation

0 Neutral

About dwp

  • Rank
    Member

Profile Information

  • Location
    Greensburg, PA
  1. SuperAntiSpyware is another choice: System Requirements: Windows 98, 98SE, ME, 2000, XP, Vista or Windows 2003 300 Mhz CPU or above 128MB memory (minimum)
  2. Thanks for the quick turnaround Scan all clean
  3. Thanks Team! Additional Info: Uninstalled Adobe Flash Player 9 ActiveX via Add/Remove and the uninstall removed the questioned finding from the registry.
  4. Win32.TrojanDownloader.Small Object Recognized! Type : Regkey Data : TAC Rating : 7 Category : Malware Comment : Rootkey : HKEY_CLASSES_ROOT Object : interface\{2e4bb6be-a75f-4dc0-9500-68203655a2c4} Export of interface\{2e4bb6be-a75f-4dc0-9500-68203655a2c4}: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [HKEY_LOCAL_MACHINE\Software\CLASSES\Interface\{2E4BB6BE-A75F-4DC0-9500-68203655A2C4}] @="IFlashBroker" [HKEY_LOCAL_MACHINE\Software\CLASSES\Interface\{2E4BB6BE-A75F-4DC0-9500-68203655A2C4}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\CLASSES\Interface\{2E4BB6BE-A75F-4DC0-9500-68203655A2C4}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Not sure, but this may be the Type Library of the FlashBroker COM server for the Macromedia Flash 9 control.
  5. This has been corrected with today's update: Reference Number : SE1R130 01.11.2006 Internal build : 162 File location : C:\Program Files\Ad-Aware SE Professional\defs.ref File size : 827740 Bytes Total size : 2672674 Bytes Signature data size : 2623206 Bytes Reference data size : 48956 Bytes Signatures total : 71527 CSI Fingerprints total : 4337 CSI data size : 186643 Bytes Target categories : 15 Target families : 1005
  6. I reported this back on Oct. 26, 2006. http://www.lavasoftsupport.com/index.php?showtopic=4353 I'm sure that this registry entry came from the SnagIt BHO AppID. To satisfy myself, I uninstalled the SnagIt Add-In via Add/Remove and this in turn, removed the reg entry. A scan by Ad-Aware confirmed it (not there anymore). Re-Installed the Add-In and the key is back.
  7. SE1R129 26.10.2006 Build 161 flagged the following: Win32.Trojan.Agent Object Recognized! Type : Regkey Data : TAC Rating : 10 Category : Data Miner Comment : Rootkey : HKEY_CLASSES_ROOT Object : appid\bho.dll This CLSID {59AEAD8A-6822-4794-AF2E-8CC27312E26E} is associated with TechSmith's SnagIt product as its BHO AppID.
  8. A new update has been released and corrected the false postives. Thanks for the quick turnaround Team Lavasoft.
  9. Ad-Aware False Positives re: today's update These 3 reg entries appear to be the same ones that were falsely identified and fixed in a previous update and are showing up again. Win32.Trojan.Agent Object Recognized! Type : Regkey Data : TAC Rating : 10 Category : Malware Comment : Rootkey : HKEY_CLASSES_ROOT Object : clsid\{48e59293-9880-11cf-9754-00aa00c00908} Win32.Trojan.Agent Object Recognized! Type : Regkey Data : TAC Rating : 10 Category : Malware Comment : Rootkey : HKEY_CLASSES_ROOT Object : interface\{48e59291-9880-11cf-9754-00aa00c00908} Win32.Trojan.Agent Object Recognized! Type : Regkey Data : TAC Rating : 10 Category : Malware Comment : Rootkey : HKEY_CLASSES_ROOT Object : typelib\{48e59290-9880-11cf-9754-00aa00c00908}
  10. This has been fixed with Reference Number : SE1R108 17.05.2006 Internal build : 129 Thanks for the quick response
  11. F/P? Alexa Object Recognized! Type : Regkey Data : TAC Rating : 5 Category : Data Miner Comment : Rootkey : HKEY_CLASSES_ROOT Object : component categories\{00021493-0000-0000-c000-000000000046}\enum