Sounds like it's time for some prevention
🙂
Run
MBSA and see if the system has weak/blank passwords on its Administrator-class accounts. If so, correct that (as well as other issues). Until those accounts have a password, preferably a strong one, the system's a sitting duck for Trojans and worms, which frequently play a part in adware/spyware installation nowdays. A strong password might be
OzzieGT@AT for example, not dictionary-based, and contains a symbol, and is adequately long to stave off a casual brute-force attack.
If it were me, I'd create a new account called
~Admin~ that's an Administrator-class account, protect it with a strong password, and only tell that password to the responsible adults who understand how spyware gets in the door and can avoid it. Make everyone use Limited-class accounts for daily usage. No power to install spyware, no tempting ActiveX popups urging them to click Yes to install stuff.
Aside from that, do they have antivirus software that detects adware/spyware? If they're on some old Norton 2003 or something, upgrade to Norton 2005 or McAfee 9.0 (both of which detect a certain amount of common spyware/adware and also the Trojans that drag them in), and configure them thoroughly. Go through the system's Services list (
example) and make sure there are no rogue services like WinTools For IE (if so, disable and stop them). Then head on to
Schadenfroh's thread and he'll get you fixed up
😎
edit: to get at the system's built-in Admin-class account(s), Owner or Administrator, log in with Safe Mode and they'll appear in User Accounts so you can assign passwords to them.