Dear John,
Here's the Kapersky scan. I suspect many of these infections are of a result of my stepson using my PC without permission to look at porn sites...he no longer has access. Not impressed.
I've not done anything about removing the infections yet - will wait to hear what you advise
KASPERSKY ONLINE SCANNER REPORT
Wednesday, December 05, 2007 7:34:35 PM
Operating System: Microsoft Windows 2000 Professional, Service Pack 4 (Build 2195)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 5/12/2007
Kaspersky Anti-Virus database records: 473083
Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true
Scan Target My Computer
A:\
C:\
D:\
E:\
F:\
Scan Statistics
Total number of scanned objects 113724
Number of viruses found 1
Number of infected objects 24
Number of suspicious objects 0
Duration of the scan process 04:07:56
Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\Common Client\Confid.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\Common Client\Content.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\Common Client\Privacy.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\Common Client\Restrict.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\Common Client\settings.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\Common Client\WebHist.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Symantec\LiveUpdate\2007-12-05_Log.ALUSchedulerSvc.LiveUpdate Object is locked skipped
C:\Documents and Settings\Default User\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Default User\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Hazel\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Hazel\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Hazel\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Hazel\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Hazel\Local Settings\History\History.IE5\MSHist012007120520071206\index.dat Object is locked skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[10].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[11].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[12].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[13].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[14].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[15].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[16].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[17].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[18].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[19].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[1].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[20].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[21].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[22].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[23].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[24].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[2].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[3].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[4].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[5].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[6].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[7].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[8].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\8HMBWTG5\3_Chicks_Bouncing_Around_encrypted[9].wmv Infected: Trojan-Downloader.WMA.Wimad.h skipped
C:\Documents and Settings\Hazel\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Hazel\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Hazel\ntuser.dat.LOG Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\AntiSpam\Log\Spam.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcrst.dll Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SNDALRT.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SNDCON.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SNDDBG.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SNDFW.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SNDIDS.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SNDSYS.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SPPolicy.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SPStart.log Object is locked skipped
C:\Program Files\Common Files\Symantec Shared\SPStop.log Object is locked skipped
C:\Program Files\Norton Internet Security\Norton AntiVirus\AVApp.log Object is locked skipped
C:\Program Files\Norton Internet Security\Norton AntiVirus\AVError.log Object is locked skipped
C:\Program Files\Norton Internet Security\Norton AntiVirus\AVVirus.log Object is locked skipped
C:\Program Files\ntl\broadband medic\SmartBridge\AlertFilter.log Object is locked skipped
C:\Program Files\ntl\broadband medic\SmartBridge\log\httpclient.log Object is locked skipped
C:\Program Files\ntl\broadband medic\SmartBridge\SmartBridge.log Object is locked skipped
C:\WINNT\CSC\00000001 Object is locked skipped
C:\WINNT\Debug\ipsecpa.log Object is locked skipped
C:\WINNT\Debug\oakley.log Object is locked skipped
C:\WINNT\Debug\PASSWD.LOG Object is locked skipped
C:\WINNT\SchedLgU.Txt Object is locked skipped
C:\WINNT\security\logs\scepol.log Object is locked skipped
C:\WINNT\system32\config\AppEvent.Evt Object is locked skipped
C:\WINNT\system32\config\default Object is locked skipped
C:\WINNT\system32\config\default.LOG Object is locked skipped
C:\WINNT\system32\config\SAM Object is locked skipped
C:\WINNT\system32\config\SAM.LOG Object is locked skipped
C:\WINNT\system32\config\SecEvent.Evt Object is locked skipped
C:\WINNT\system32\config\SECURITY Object is locked skipped
C:\WINNT\system32\config\SECURITY.LOG Object is locked skipped
C:\WINNT\system32\config\software Object is locked skipped
C:\WINNT\system32\config\software.LOG Object is locked skipped
C:\WINNT\system32\config\SysEvent.Evt Object is locked skipped
C:\WINNT\system32\config\system Object is locked skipped
C:\WINNT\system32\config\SYSTEM.ALT Object is locked skipped
D:\gobackio.bin Object is locked skipped
Here's the Hijackthis log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:44:36, on 05/12/2007
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal
Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\csrss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Norton Internet Security\ISSVC.exe
C:\WINNT\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Norton GoBack\GBPoll.exe
C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\PROGRA~1\ntl\BROADB~1\SMARTB~1\MotiveSB.exe
C:\Program Files\MSN Apps\Updater\01.03.0000.1005\en-gb\msnappau.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\PROGRA~1\Adaptec\PHOTOR~1\CreateCD.exe
C:\WINNT\system32\internat.exe
C:\System\reminder.exe
C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINNT\system32\wuauclt.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Symantec Shared\AdBlocking\NSMdtr.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.google.co.uk/R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - C:\Program Files\MSN Apps\ST\01.02.3000.1001\en-xu\stmain.dll
O2 - BHO: Norton Internet Security - {9ECB9560-04F9-4bbc-943D-298DDF1699E1} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.5000.1021\en-gb\msntb.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.5000.1021\en-gb\msntb.dll
O3 - Toolbar: Norton Internet Security - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\ntl\BROADB~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [msnappau] "C:\Program Files\MSN Apps\Updater\01.03.0000.1005\en-gb\msnappau.exe"
O4 - HKLM\..\Run: [SSC_UserPrompt] C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [ErrorKiller] "C:\Program Files\ErrorKiller\ErrorKiller.exe" -boot
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKLM\..\Run: [CreateCD] C:\PROGRA~1\Adaptec\PHOTOR~1\CreateCD.exe -r
O4 - HKCU\..\Run: [internat.exe] internat.exe
O4 - HKCU\..\Run: [Reminder] C:\System\reminder.exe
O4 - HKCU\..\Run: [Uniblue RegistryBooster2] C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe /S
O4 - HKUS\.DEFAULT\..\Run: [internat.exe] internat.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [^SetupICWDesktop] C:\Program Files\Internet Explorer\Connection Wizard\icwconn1.exe /desktop (User 'Default user')
O8 - Extra context menu item: &Google Search -
res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word -
res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links -
res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page -
res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages -
res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English -
res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) -
http://www.kaspersky.com/kos/eng/partne ... nicode.cabO16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) -
http://go.microsoft.com/fwlink/?linkid=39204O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) -
http://www.update.microsoft.com/windows ... 4611367787O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: GoBack Polling Service (GBPoll) - Symantec Corporation - C:\Program Files\Norton GoBack\GBPoll.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: ISSvc (ISSVC) - Symantec Corporation - C:\Program Files\Norton Internet Security\ISSVC.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINNT\system32\LEXBCES.EXE
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
--
End of file - 9261 bytes
Scan process completed.
As regards what SpyWare Doctor removed, I'm having difficulty finding the information I think you need. Under "Quarantine" it says 2 items quarantined, Threat name Spyware.Known_Bad-Sites
When I click on details, I get a message I can't copy/paste but gives details of Quarantine storage file, date & time quarantine, file size 69632 bytes, items 2
then
Spyware.Known_Bad-Sites - low
D:\old system 0804\Program Files\FreeRIP2\kbase.url
D:\old system 0804\Program Files\FreeRIP2\freerip.url
If I then click on "learn more about this threat", I get:
Spyware Research > Infections > Spyware.Known_Bad_Sites
Details of the selected infection are shown below. This infection can be detected and cleaned using Spyware Doctor.
Name: Spyware.Known_Bad_Sites
Threat Level: High
Description: Indicates that a known bad site may have hijacked. Adware, Spyware and Phishing sites may use the Windows hosts file to redirect your browser to a malicious site when you try to access a valid site such as your Bank.
Type: Spyware
Removal: This infection can be removed using Spyware Doctor.
--------------------------------------------------------------------------------
At least one or more of the following fields may be indicated:
Name: the name of the specific infection, as presented in the database.
Also known as: other names by which this infection may be known.
Type: the category to which the infection belongs. Refer to the Glossary for further details on infection types.
Variant: the family of infections to which this infection belongs.
By: the vendor of this infection.
Threat: the threat level assigned to this infection.
Description: a more detailed description of the infection. If the information is available, technical aspects and symptoms of this infection are described here.
Does that help?
Hazel