A bit more information would be nice.
The 1000 is probably some sort of iteration count.
Both base64-encoded strings that are separated by a colon are of the same length (24). Perhaps they are IV:ciphertext or vice-versa (you could test the order by processing a > 24 character string, the larger of the strings being the ciphertext)? This is supported by the fact that most (popular) cipher modes that employ IVs require IVs of the same length as the block.
If my hypothesis is correct, the block size would be 192 bits (24 * 8 _antiBBCode_), which I found rather strange. It would also eliminate AES from the possible algorithms (but not Rijndael) because AES operates exclusively on 128-bit blocks.
Oh, and the non-static IV is why every ciphertext looks different.
Most modes require a unique binary sequence, often called an initialization vector (IV), for each encryption operation. The IV has to be non-repeating and for some modes random as well. The initialization vector is used to ensure distinct ciphertexts are produced even when the same plaintext is encrypted multiple times independently with the same key.
Alright, it turns out that it's for user passwords.
The format is probably IterationCount:Salt:Hash.
I don't really see the point in having a 192-bit salt as opposed to a 128-bit one if you don't have like 10,000,000 users.
I haven't seen many 192-bit hash functions other than Bcrypt, Tiger, and HAVAL.
Even then, the devs should be using PBKDF2 or something.