Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

g.js from adadvisor.net


  • Please log in to reply
5 replies to this topic

#1 heavydude

heavydude

  • Members
  • 94 posts
  • OFFLINE
  •  
  • Local time:06:22 AM

Posted 27 April 2012 - 07:48 PM

Found IE-9's download viewer open on my screen when I got home this afternoon.

Under View and Track Your Downloads:

Name:

g.js
adadvisor.net
360 bytes

Do you want to open or save this file?


Well, I didn't download it and have no idea what it is.

I searched my hard drive and it's not on it.

Does anybody know what it is?

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 61,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:22 AM

Posted 27 April 2012 - 08:50 PM

Hello.

adadvisor.net is a domain used by Targus Info which is an advertising company that is part of a network of sites, cookies, and other technologies used to track you, what you do and what you click on, as you go from site to site, surfing the Web. Over time, sites like adadvisor.net can help make an online profile of you usually including the sites you visit, your searches, purchases, and other behavior. Your profile can then be exchanged and sold between various companies like adadvisor.net as well as being sold to other advertisers and marketers.

http://www.donottrackplus.com/trackers/adadvisor.net.php


Its obviuos spyware.. hy it was there I am uncertain.

Lets look at your system and see if its infected.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
    For instructions with screenshots, please refer to the How to use SUPERAntiSpyware to scan and remove malware from your computer Guide.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all other options as they are set):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the Control Center screen.
  • Back on the main screen, under "Select Scan Type" check the box for Complete Scan.
  • If your computer is badly infected, be sure to check the box next to Enable Rescue Scan (Highly Infected Systems ONLY).
  • Click the Scan your computer... button.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the scan log after reboot, launch SUPERAntiSpyware again.
  • Click the View Scan Logs button at the bottom.
  • This will open the Scanner Logs Window.
  • Click on the log to highlight it and then click on View Selected Log to open it.
  • Copy and paste the scan log results in your next reply.
-- Some types of malware will disable security tools. If SUPERAntiSpyware will not install, please refer to these instructions for using the SUPERAntiSpyware Installer. If SUPERAntiSpyware is already installed but will not run, then follow the instructions for using RUNSAS.EXE to launch the program.




Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

How do I get help? Who is helping me?
Staying Updated Calendar of Updates.
For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....
Become a BleepingComputer fan: Facebook Have you seen..Select Real Security

#3 heavydude

heavydude
  • Topic Starter

  • Members
  • 94 posts
  • OFFLINE
  •  
  • Local time:06:22 AM

Posted 27 April 2012 - 11:36 PM

MiniToolBox Results

MiniToolBox by Farbar Version: 18-01-2012
Ran by Jack (administrator) on 27-04-2012 at 19:38:59
Microsoft® Windows Vista™ Home Premium Service Pack 2 (X86)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================

::1 localhost

127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1001namen.com
127.0.0.1 www.1001namen.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100888290cs.com

There are 15064 more lines starting with "127.0.0.1"

========================= IP Configuration: ================================

NVIDIA nForce 10/100 Mbps Ethernet = Local Area Connection (Connected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : Jack-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : ph.cox.net

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . : ph.cox.net
Description . . . . . . . . . . . : NVIDIA nForce 10/100 Mbps Ethernet
Physical Address. . . . . . . . . : 00-1E-90-3D-C8-AA
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::152b:562e:866f:7c04%10(Preferred)
IPv4 Address. . . . . . . . . . . : 70.162.40.202(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.254.0
Lease Obtained. . . . . . . . . . : Thursday, April 26, 2012 9:30:30 AM
Lease Expires . . . . . . . . . . : Saturday, April 28, 2012 9:30:30 AM
Default Gateway . . . . . . . . . : 70.162.40.1
DHCP Server . . . . . . . . . . . : 172.19.73.55
DHCPv6 IAID . . . . . . . . . . . : 251666064
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-0F-FA-29-3C-00-1E-90-3D-C8-AA
DNS Servers . . . . . . . . . . . : 68.105.28.11
68.105.29.11
68.105.28.12
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Local Area Connection* 6:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:38f1:3967:b95d:d735(Preferred)
Link-local IPv6 Address . . . . . : fe80::38f1:3967:b95d:d735%11(Preferred)
Default Gateway . . . . . . . . . :
NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : ph.cox.net
Description . . . . . . . . . . . : isatap.ph.cox.net
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Connection-specific DNS Suffix . : ph.cox.net
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2002:46a2:28ca::46a2:28ca(Preferred)
Default Gateway . . . . . . . . . : 2002:c058:6301::c058:6301
DNS Servers . . . . . . . . . . . : 68.105.28.11
68.105.29.11
68.105.28.12
NetBIOS over Tcpip. . . . . . . . : Disabled
Server: cdns1.cox.net
Address: 68.105.28.11

Name: google.com
Addresses: 74.125.224.161
74.125.224.162
74.125.224.163
74.125.224.164
74.125.224.165
74.125.224.166
74.125.224.167
74.125.224.168
74.125.224.169
74.125.224.174
74.125.224.160



Pinging google.com [74.125.239.9] with 32 bytes of data:

Reply from 74.125.239.9: bytes=32 time=25ms TTL=58

Reply from 74.125.239.9: bytes=32 time=22ms TTL=58



Ping statistics for 74.125.239.9:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 22ms, Maximum = 25ms, Average = 23ms

Server: cdns1.cox.net
Address: 68.105.28.11

Name: yahoo.com
Addresses: 98.139.183.24
209.191.122.70
72.30.38.140



Pinging yahoo.com [72.30.38.140] with 32 bytes of data:

Reply from 72.30.38.140: bytes=32 time=40ms TTL=57

Reply from 72.30.38.140: bytes=32 time=36ms TTL=57



Ping statistics for 72.30.38.140:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 36ms, Maximum = 40ms, Average = 38ms

Server: cdns1.cox.net
Address: 68.105.28.11

Name: bleepingcomputer.com
Address: 208.43.87.2



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:

Request timed out.

Request timed out.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
10 ...00 1e 90 3d c8 aa ...... NVIDIA nForce 10/100 Mbps Ethernet
1 ........................... Software Loopback Interface 1
11 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
12 ...00 00 00 00 00 00 00 e0 isatap.ph.cox.net
13 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 70.162.40.1 70.162.40.202 20
70.162.40.0 255.255.254.0 On-link 70.162.40.202 276
70.162.40.202 255.255.255.255 On-link 70.162.40.202 276
70.162.41.255 255.255.255.255 On-link 70.162.40.202 276
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 70.162.40.202 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 70.162.40.202 276
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
13 1125 ::/0 2002:c058:6301::c058:6301
1 306 ::1/128 On-link
11 18 2001::/32 On-link
11 266 2001:0:4137:9e76:38f1:3967:b95d:d735/128
On-link
13 1025 2002::/16 On-link
13 281 2002:46a2:28ca::46a2:28ca/128
On-link
10 276 fe80::/64 On-link
11 266 fe80::/64 On-link
10 276 fe80::152b:562e:866f:7c04/128
On-link
11 266 fe80::38f1:3967:b95d:d735/128
On-link
1 306 ff00::/8 On-link
11 266 ff00::/8 On-link
10 276 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\system32\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\system32\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\System32\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\System32\winrnr.dll [19968] (Microsoft Corporation)
Catalog9 01 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (04/26/2012 04:32:07 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 9.0.8112.16421, time stamp 0x4d76255d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x0670f063,
process id 0x870, application start time 0xiexplore.exe0.

Error: (04/26/2012 09:32:05 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (04/26/2012 08:49:45 AM) (Source: Application Error) (User: )
Description: Faulting application PhotoStudio.exe, version 5.5.0.87, time stamp 0x461efdc5, faulting module ntdll.dll, version 6.0.6002.18541, time stamp 0x4ec3e3d5, exception code 0xc0000005, fault offset 0x00067db0,
process id 0xf10, application start time 0xPhotoStudio.exe0.

Error: (04/25/2012 06:26:39 PM) (Source: Application Error) (User: )
Description: Faulting application PhotoStudio.exe, version 5.5.0.87, time stamp 0x461efdc5, faulting module ntdll.dll, version 6.0.6002.18541, time stamp 0x4ec3e3d5, exception code 0xc0000005, fault offset 0x00067db0,
process id 0x16a0, application start time 0xPhotoStudio.exe0.

Error: (04/25/2012 11:17:51 AM) (Source: Application Error) (User: )
Description: Faulting application PhotoStudio.exe, version 5.5.0.87, time stamp 0x461efdc5, faulting module ntdll.dll, version 6.0.6002.18541, time stamp 0x4ec3e3d5, exception code 0xc0000005, fault offset 0x00067daa,
process id 0xa90, application start time 0xPhotoStudio.exe0.

Error: (04/22/2012 11:05:03 AM) (Source: VSS) (User: )
Description: Volume Shadow Copy Service error: Unexpected error querying for the IVssWriterCallback interface. hr = 0x80070005.
This is often caused by incorrect security settings in either the writer or requestor process.


Operation:
Gathering Writer Data

Context:
Writer Class Id: {e8132975-6f93-4464-a53e-1050253ae220}
Writer Name: System Writer
Writer Instance ID: {a12c2c60-2a68-40c5-9891-9b4ef55ff89b}

Error: (04/20/2012 07:28:46 PM) (Source: VSS) (User: )
Description: Volume Shadow Copy Service error: Unexpected error querying for the IVssWriterCallback interface. hr = 0x80070005.
This is often caused by incorrect security settings in either the writer or requestor process.


Operation:
Gathering Writer Data

Context:
Writer Class Id: {e8132975-6f93-4464-a53e-1050253ae220}
Writer Name: System Writer
Writer Instance ID: {a12c2c60-2a68-40c5-9891-9b4ef55ff89b}

Error: (04/19/2012 07:58:10 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 9.0.8112.16421, time stamp 0x4d76255d, faulting module AcroRd32.dll_unloaded, version 0.0.0.0, time stamp 0x4f71ac4e, exception code 0xc0000005, fault offset 0x60ede281,
process id 0xad8, application start time 0xiexplore.exe0.

Error: (04/17/2012 06:10:03 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (04/17/2012 00:56:12 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 9.0.8112.16421, time stamp 0x4d76255d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0xa9e42f86,
process id 0x1130, application start time 0xiexplore.exe0.


System errors:
=============
Error: (04/21/2012 05:24:00 PM) (Source: Schannel) (User: )
Description: An SSL connection request was received from a remote client application, but none of the cipher suites supported by the client application are supported by the server. The SSL connection request has failed.

Error: (04/17/2012 06:06:36 PM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (04/17/2012 06:06:36 PM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search

Error: (04/17/2012 06:06:36 PM) (Source: DCOM) (User: )
Description: 1053WSearch{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}

Error: (04/13/2012 07:03:26 AM) (Source: DCOM) (User: )
Description: {7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}

Error: (04/13/2012 06:24:23 AM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (04/13/2012 06:24:23 AM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search

Error: (04/13/2012 06:24:23 AM) (Source: DCOM) (User: )
Description: 1053WSearch{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}

Error: (04/08/2012 00:18:29 PM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (04/08/2012 00:18:29 PM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

2007 Microsoft Office Suite Service Pack 1 (SP1)
2012 National Renovation and Insurance Repair Estimator (Version: 1.00.0000)
4Free Video Converter 2
Adobe AIR (Version: 2.6.0.19140)
Adobe Flash Player 11 ActiveX (Version: 11.1.102.62)
Adobe Flash Player 11 Plugin (Version: 11.1.102.62)
Adobe Help Center 2.1 (Version: 2.1)
Adobe Photoshop Elements 5.0 (Version: 5.0)
Adobe Reader 9.5.1 (Version: 9.5.1)
Amazon Kindle
Amazon MP3 Downloader 1.0.12 (Version: 1.0.12)
ArcSoft PhotoStudio 5.5
Audacity 1.2.6
Canon CanoScan 8800F User Registration
Canon MP Navigator EX 1.0
Canon Utilities Solution Menu
CCleaner (Version: 3.14)
Compatibility Pack for the 2007 Office system (Version: 12.0.4518.1014)
Craftsman Software Update (Version: 3.01.0000)
CyberLink DVD Suite Deluxe (Version: 5.5.1329)
CyberLink PowerDirector (Version: 6.5.2726)
Free Mp3 Wma Converter V 1.8.0
Google Earth (Version: 6.1.0.5001)
Google Update Helper (Version: 1.3.21.111)
Hardware Diagnostic Tools (Version: 5.1.4748.24)
Hewlett-Packard Active Check for Health Check (Version: 1.1.15.2)
Hewlett-Packard Asset Agent for Health Check (Version: 2.0.63.2)
HP Active Support Library (Version: 3.1.0.6)
HP Customer Experience Enhancements (Version: 5.6.0.2510)
HP Customer Feedback (Version: 1.0.0)
HP Demo (Version: HP Demo)
HP Total Care Advisor (Version: 2.1.3329.2629)
HP Update (Version: 4.000.007.003)
HPTCSSetup (Version: 1.0.964.2626)
Java™ SE Runtime Environment 6 Update 1 (Version: 1.6.0.10)
KONICA MINOLTA magicolor 2400W
LabelPrint (Version: 2.2.2529)
LightScribe System Software 1.12.37.1 (Version: 1.12.37.1)
LightScribeTemplateLabeler (Version: 1.10.23.1)
Malwarebytes Anti-Malware version 1.61.0.1400 (Version: 1.61.0.1400)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Antimalware (Version: 3.0.8402.2)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6215.1000)
Microsoft Office Home and Student 2007 (Version: 12.0.6215.1000)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6215.1000)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6215.1000)
Microsoft Office PowerPoint Viewer 2007 (English) (Version: 12.0.4518.1014)
Microsoft Office Proof (English) 2007 (Version: 12.0.6213.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6213.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6213.1000)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6215.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6215.1000)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6215.1000)
Microsoft Save as PDF or XPS Add-in for 2007 Microsoft Office programs (Version: 12.0.4518.1014)
Microsoft Security Client (Version: 2.1.1116.0)
Microsoft Security Essentials (Version: 2.1.1116.0)
Microsoft Silverlight (Version: 4.1.10111.0)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Works (Version: 9.7.0621)
Move Networks Media Player for Internet Explorer
MSXML 4.0 SP2 (KB936181) (Version: 4.20.9848.0)
MSXML 4.0 SP2 (KB941833) (Version: 4.20.9849.0)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MSXML 4.0 SP2 Parser and SDK (Version: 4.20.9818.0)
muvee autoProducer 6.1 (Version: 6.10.050)
My HP Games (Version: 1.0.0.43)
NVIDIA Drivers
OLYMPUS Master 2 (Version: 1.0.13)
PhotoScape
Power2Go 5.0 (Version: 5.6.3917)
Presto! PageManager 7.15.16 (Version: 7.15.16)
Python 2.5 (Version: 2.5.150)
Realtek High Definition Audio Driver (Version: 6.0.1.5789)
Revo Uninstaller 1.93 (Version: 1.93)
ScanSoft OmniPage SE 4 (Version: 15.2.0020)
Snapfish Picture Mover (Version: 1.9.0.16)
Soft Data Fax Modem with SmartCP (Version: 7.74.00)
Spybot - Search & Destroy (Version: 1.6.2)
Stickies 7.0b
The National Estimator (Version: 4.00.0000)
thinkorswim from TD AMERITRADE
TreeSize Free V2.5 (Version: 2.5)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217) (Version: 1)
Visual C++ 2008 x86 Runtime - (v9.0.30729) (Version: 9.0.30729)
Visual C++ 2008 x86 Runtime - v9.0.30729.01 (Version: 9.0.30729.01)
VLC media player 1.1.4 (Version: 1.1.4)
Windows Live OneCare safety scanner
Windows Live OneCare safety scanner (Version: 1.0.0.0)

========================= Memory info: ===================================

Percentage of memory in use: 52%
Total physical RAM: 3005.76 MB
Available physical RAM: 1427.1 MB
Total Pagefile: 6240.04 MB
Available Pagefile: 4858.59 MB
Total Virtual: 2047.88 MB
Available Virtual: 1943.4 MB

========================= Partitions: =====================================

1 Drive c: (COMPAQ) (Fixed) (Total:222.71 GB) (Free:132.69 GB) NTFS
2 Drive d: (FACTORY_IMAGE) (Fixed) (Total:10.17 GB) (Free:0.97 GB) NTFS
4 Drive f: (FreeAgent Drive) (Fixed) (Total:465.76 GB) (Free:328.98 GB) NTFS

========================= Users: ========================================

User accounts for \\JACK-PC

Administrator Guest Jack


**** End of log ****




Super Anti Spyware Results

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/27/2012 at 09:16 PM

Application Version : 5.0.1148

Core Rules Database Version : 8528
Trace Rules Database Version: 6340

Scan type : Complete Scan
Total Scan Time : 01:20:34

Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002)
UAC On - Limited User (Administrator User)

Memory items scanned : 613
Memory threats detected : 0
Registry items scanned : 35068
Registry threats detected : 0
File items scanned : 54102
File threats detected : 253

Adware.Tracking Cookie
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\LDRKA6PN.txt [ /imrworldwide.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\DU5EEPG7.txt [ /ads.oregonlive.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\K1015SZJ.txt [ /liveperson.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\X10Z3B9Y.txt [ /banner.motorcycle-usa.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\WAG2RG51.txt [ /dmtracker.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\NNHL0ZOS.txt [ /tacoda.at.atwola.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\LAKDQSJS.txt [ /lxn.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\CVJYL6JI.txt [ /pointroll.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\O01ZFBUM.txt [ /media6degrees.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\RY06FCQQ.txt [ /ar.atwola.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Y38NO8IE.txt [ /ad.yieldmanager.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\D2NU38HB.txt [ /revsci.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\UN2HXIHZ.txt [ /atwola.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\SQCWCQ7N.txt [ /a1.interclick.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\TQ2T4K0O.txt [ /invitemedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\YT4T0P2K.txt [ /bridge1.admarketplace.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\LVXFHUZW.txt [ /rotator.adjuggler.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\27C3RSL1.txt [ /ad.wsod.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\PD0J3F6O.txt [ /serving-sys.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\ST0BWYD7.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\NN4BFA28.txt [ /ads.pubmatic.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\JC81VYGY.txt [ /interclick.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\9OL55P2W.txt [ /lucidmedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Z915F159.txt [ /adinterax.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Y59GDSCZ.txt [ /stats.townnews.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\UK4M9Z4Y.txt [ /ads.undertone.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\6EB0NK2Q.txt [ /in.getclicky.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\T2OMIU5A.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\R1CS7VST.txt [ /trafficmp.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\1WXSET8Q.txt [ /collective-media.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\XRXE777A.txt [ /ads.pointroll.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\T02965BM.txt [ /kanoodle.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\53L3NV1W.txt [ /www.qsstats.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\X131YI3X.txt [ /adv.dmv.org ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\974WDGHH.txt [ /amazon-adsystem.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\ZRKPXAED.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\348BHDAZ.txt [ /realmedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\CZO4A2P4.txt [ /at.atwola.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\YT296YX2.txt [ /insightexpressai.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\2Q1IOJT2.txt [ /adbrite.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\OJ3IYBLB.txt [ /clickfuse.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\1CS5OGW7.txt [ /ads.pof.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\X6XQ5YPH.txt [ /yieldmanager.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\8AA8QK8L.txt [ /adxpose.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\KAZ7W30F.txt [ /stats-newyork1.bloxcms.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\7KNZOUL4.txt [ /legolas-media.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\WGOYJ28Y.txt [ /bs.serving-sys.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\YQY3YX3I.txt [ /ad2.adfarm1.adition.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\CGF4GMZJ.txt [ /pro-market.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\FXHQ64O0.txt [ /interchangecorporation.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\YWGWZO81.txt [ /s.clickability.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\4S8HIHXJ.txt [ /kontera.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\57Z0LA2W.txt [ /questionmarket.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\HU0D4E2C.txt [ /adserver.adtechus.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\JK1WG28I.txt [ /liveperson.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\DG95FC2L.txt [ /findlaw.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\58WLICGH.txt [ /adx.investopedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\WLPLAOP5.txt [ /ads.cnn.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\IQ20D0DX.txt [ /admarketplace.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\VJ4ZFT9E.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\QD16NMFK.txt [ /tribalfusion.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\81J6QY4B.txt [ /stats.townnews.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\UJ99MXI9.txt [ /leeenterprises.112.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\A9N15IIX.txt [ /247realmedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\5PKW8STU.txt [ /adtech.de ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\4VDWUNV9.txt [ /www.qsstats.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\M10FDCR1.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\XL0HOKS3.txt [ /findarticles.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Y85E2NVF.txt [ /overture.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\IPKU6QKD.txt [ /clickbooth.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\MOFJ95R2.txt [ /adultfriendfinder.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\6GBRLOTD.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\KYRWVR1Y.txt [ /crosswordtracker.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\7O14GHO6.txt [ /2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\FYSGI1W6.txt [ /specificclick.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\4Y3Y5OIF.txt [ /tdstats.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\HSZMZ6TM.txt [ /ru4.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\2ZKHCFEZ.txt [ /liveperson.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\IR7C4SE5.txt [ /ads.al.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\1GB3IBDZ.txt [ /farecastcom.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\FGINBEG1.txt [ /sales.liveperson.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\GQXCI0IM.txt [ /www.depositaccounts.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\KVA5IQPV.txt [ /lovecomm.rotator.hadj7.adjuggler.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\NX6G6UR5.txt [ /emailquestions.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\JGDF2HMF.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\5UQTY0Z6.txt [ /adserver2.news-journalonline.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\NZ50U3DQ.txt [ /ads.mlive.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\MVS0SR7K.txt [ /homestore.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\A8YNGPV2.txt [ /macombcountymi.gov ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\75JRSJPQ.txt [ /srv.clickfuse.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\97UQ7WQY.txt [ /allbritton.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\P3UQGT0S.txt [ /path-tracker.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\G98IQDWY.txt [ /cookcountyassessor.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\ZLYKEPC0.txt [ /govtrack.us ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\BSJ0HQ4T.txt [ /warnerbros.112.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\5C4I51ZF.txt [ /www.findlegalforms.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\HO5RPM8S.txt [ /eyewonder.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\S1KC62GO.txt [ /www.mybanktracker.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\U11GUKMO.txt [ /gwinnettcounty.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\T2IHP3HD.txt [ /adfarm1.adition.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\RDU3MU3N.txt [ /ad.360yield.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\DV5X6NJT.txt [ /infrastrategy.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\35VBMEM2.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\SHKQ7RBW.txt [ /stats.townnews.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\UD4PQ7UH.txt [ /accounts.google.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\4GEXAC83.txt [ /findarticles.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\I0C4EGC3.txt [ /media.adfrontiers.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\18JH2UC6.txt [ /liveperson.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\7DXXJKLN.txt [ /aspenmarketingservices.112.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\PP7YP3XT.txt [ /journalregistercompany.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\A42RK4PX.txt [ /acronymfinder.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\22TYJ6AQ.txt [ /www.nramedia.org ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\HWZSMJDL.txt [ /ads.saymedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Y2WL34JQ.txt [ /additudemag.advertserve.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\3D501H0W.txt [ /greenecountymo.org ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\EZJ05PQO.txt [ /112.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\0FFQF8UO.txt [ /www.googleadservices.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\FL93UZAW.txt [ /banktracker.investigativereportingworkshop.org ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\5UYBL6MM.txt [ /msnbc.112.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\GLB3ESQ2.txt [ /depositaccounts.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\4FOPFAYE.txt [ /www.3dstats.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\B59UFCU4.txt [ /kingdigital.122.2o7.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\FCL0KU1D.txt [ /mediaservices-d.openxenterprise.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\UIBOWRP1.txt [ /findnsave.thestate.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\QGPOIY2F.txt [ /mm.chitika.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Y6MVGH0Y.txt [ /mybanktracker.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\HLZTCZLZ.txt [ /weboramapublishertrackinguk.solution.weborama.fr ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\83FN9L3O.txt [ /citi.bridgetrack.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\71YGO3TO.txt [ /www.govtrack.us ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\14BDZDZV.txt [ /twc.rotator.hadj7.adjuggler.net ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\9M59R121.txt [ /www.path-tracker.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\UL7HCPUY.txt [ /weborama.fr ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\X7VF481A.txt [ /ads2.ljworld.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\JW8KPU9K.txt [ /thesexylist.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\Q1U51S2Z.txt [ /stat.dealtime.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\G4NCQO6S.txt [ /findlegalforms.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\598I3RWP.txt [ /www.emailquestions.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\CTF2EEE5.txt [ /steelhousemedia.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\GRAZE0FZ.txt [ /www.localadultpages.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\EOMNAOXP.txt [ /counter.surfcounters.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\GC983UDI.txt [ /phoenix.thesexylist.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\TQWT0TOF.txt [ /www.dmvtrack.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\3EQQR4Y6.txt [ /stats.aatrk.com ]
C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Cookies\6TZPL085.txt [ /synacor.112.2o7.net ]
C:\USERS\JACK\AppData\Roaming\Microsoft\Windows\Cookies\2HFL7MRP.txt [ Cookie:[email protected]/adserving ]
C:\USERS\JACK\Cookies\LDRKA6PN.txt [ Cookie:[email protected]/cgi-bin ]
C:\USERS\JACK\Cookies\X10Z3B9Y.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\WAG2RG51.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\NNHL0ZOS.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\LAKDQSJS.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\CVJYL6JI.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\O01ZFBUM.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\RY06FCQQ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\D2NU38HB.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\SQCWCQ7N.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\2HFL7MRP.txt [ Cookie:[email protected]/adserving ]
C:\USERS\JACK\Cookies\YT4T0P2K.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\LVXFHUZW.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\9OL55P2W.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\Z915F159.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\Y59GDSCZ.txt [ Cookie:[email protected]/thewo-www2.theworldlink.com/ ]
C:\USERS\JACK\Cookies\T2OMIU5A.txt [ Cookie:[email protected]/pagead/conversion/1010167715/ ]
C:\USERS\JACK\Cookies\R1CS7VST.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\1WXSET8Q.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\XRXE777A.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\T02965BM.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\53L3NV1W.txt [ Cookie:[email protected]/dcslzswek10000g81n6laj5r2_3i6x ]
C:\USERS\JACK\Cookies\974WDGHH.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\ZRKPXAED.txt [ Cookie:[email protected]/pagead/conversion/1061331804/ ]
C:\USERS\JACK\Cookies\348BHDAZ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\2Q1IOJT2.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\X6XQ5YPH.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\8AA8QK8L.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\KAZ7W30F.txt [ Cookie:[email protected]/stltoday.com/ ]
C:\USERS\JACK\Cookies\WGOYJ28Y.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\YQY3YX3I.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\CGF4GMZJ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\YWGWZO81.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\4S8HIHXJ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\57Z0LA2W.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\HU0D4E2C.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\JK1WG28I.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\DG95FC2L.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\VJ4ZFT9E.txt [ Cookie:[email protected]/pagead/conversion/1057877926/ ]
C:\USERS\JACK\Cookies\QD16NMFK.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\81J6QY4B.txt [ Cookie:[email protected]/theworldlink.com/ ]
C:\USERS\JACK\Cookies\UJ99MXI9.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\A9N15IIX.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\5PKW8STU.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\4VDWUNV9.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\M10FDCR1.txt [ Cookie:[email protected]/pagead/conversion/1072543990/ ]
C:\USERS\JACK\Cookies\XL0HOKS3.txt [ Cookie:[email protected]/p/articles/mi_m2194/is_n7_v63/ai_15658023/ ]
C:\USERS\JACK\Cookies\Y85E2NVF.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\IPKU6QKD.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\MOFJ95R2.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\6GBRLOTD.txt [ Cookie:[email protected]/pagead/conversion/1070227189/ ]
C:\USERS\JACK\Cookies\7O14GHO6.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\4Y3Y5OIF.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\HSZMZ6TM.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\2ZKHCFEZ.txt [ Cookie:[email protected]/hc/73111821 ]
C:\USERS\JACK\Cookies\1GB3IBDZ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\GQXCI0IM.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\KVA5IQPV.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\NX6G6UR5.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\JGDF2HMF.txt [ Cookie:[email protected]/pagead/conversion/1011832787/ ]
C:\USERS\JACK\Cookies\A8YNGPV2.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\75JRSJPQ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\97UQ7WQY.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\P3UQGT0S.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\ZLYKEPC0.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\BSJ0HQ4T.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\5C4I51ZF.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\HO5RPM8S.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\S1KC62GO.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\DV5X6NJT.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\35VBMEM2.txt [ Cookie:[email protected]/pagead/conversion/1058672771/ ]
C:\USERS\JACK\Cookies\4GEXAC83.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\18JH2UC6.txt [ Cookie:[email protected]/hc/57460284 ]
C:\USERS\JACK\Cookies\7DXXJKLN.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\PP7YP3XT.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\22TYJ6AQ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\HWZSMJDL.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\Y2WL34JQ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\0FFQF8UO.txt [ Cookie:[email protected]/pagead/conversion/1006786173/ ]
C:\USERS\JACK\Cookies\FL93UZAW.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\5UYBL6MM.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\GLB3ESQ2.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\4FOPFAYE.txt [ Cookie:[email protected]/cgi-bin ]
C:\USERS\JACK\Cookies\B59UFCU4.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\FCL0KU1D.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\QGPOIY2F.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\Y6MVGH0Y.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\HLZTCZLZ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\83FN9L3O.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\71YGO3TO.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\14BDZDZV.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\9M59R121.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\JW8KPU9K.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\Q1U51S2Z.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\G4NCQO6S.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\GRAZE0FZ.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\EOMNAOXP.txt [ Cookie:[email protected]/ ]
C:\USERS\JACK\Cookies\GC983UDI.txt [ Cookie:[email protected]/-FemaleEscorts/ ]
C:\USERS\JACK\Cookies\TQWT0TOF.txt [ Cookie:[email protected]/ ]
cdnx.tribalfusion.com [ C:\USERS\JACK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\F2NYPFHZ ]
core.insightexpressai.com [ C:\USERS\JACK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\F2NYPFHZ ]
ia.media-imdb.com [ C:\USERS\JACK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\F2NYPFHZ ]
secure-us.imrworldwide.com [ C:\USERS\JACK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\F2NYPFHZ ]
sftrack.searchforce.net [ C:\USERS\JACK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\F2NYPFHZ ]

Trojan.Unclassified/Loader-Suspicious
C:\PROGRAM FILES\4FREE VIDEO CONVERTER\LOADER.EXE
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\4FREE VIDEO CONVERTER\4FREE VIDEO CONVERTER .LNK
C:\USERS\JACK\DESKTOP\AUDIO VIDEO SHORTCUTS\4FREE VIDEO CONVERTER .LNK

Trojan.Agent/Gen-Nullo[Short]
C:\SYSTEM VOLUME INFORMATION\SYSTEMRESTORE\FRSTAGING\USERS\JACK\APPDATA\ROAMING\SYSTEMPROC\LSASS.EXE




aswMBR Results

aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-04-27 21:25:55
-----------------------------
21:25:55.250 OS Version: Windows 6.0.6002 Service Pack 2
21:25:55.250 Number of processors: 2 586 0x6B02
21:25:55.250 ComputerName: JACK-PC UserName: Jack
21:25:56.685 Initialize success
21:26:47.026 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\0000004e
21:26:47.026 Disk 0 Vendor: ST325031 3.AH Size: 238475MB BusType: 6
21:26:47.042 Disk 0 MBR read successfully
21:26:47.042 Disk 0 MBR scan
21:26:47.058 Disk 0 unknown MBR code
21:26:47.058 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 228055 MB offset 63
21:26:47.104 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 10417 MB offset 467057745
21:26:47.120 Disk 0 scanning sectors +488392065
21:26:47.214 Disk 0 scanning C:\Windows\system32\drivers
21:26:54.031 Service scanning
21:26:59.101 Service MpKsl57ed9306 C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{B70CA68C-8BBC-4A00-9D9F-039982F217E5}\MpKsl57ed9306.sys **LOCKED** 32
21:26:59.226 Service MpNWMon C:\Windows\system32\DRIVERS\MpNWMon.sys **LOCKED** 32
21:27:05.809 Modules scanning
21:27:22.688 Disk 0 trace - called modules:
21:27:22.719 ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll storport.sys nvstor32.sys
21:27:22.735 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8618f6a8]
21:27:22.750 3 CLASSPNP.SYS[807328b3] -> nt!IofCallDriver -> [0x85afff08]
21:27:22.750 5 acpi.sys[8060f6bc] -> nt!IofCallDriver -> \Device\0000004e[0x856dd9a8]
21:27:22.766 Scan finished successfully
21:27:50.825 Disk 0 MBR has been saved successfully to "C:\Users\Jack\Desktop\MBR.dat"
21:27:50.825 The log file has been saved successfully to "C:\Users\Jack\Desktop\aswMBR.txt"


Note:
21:26:59.101 and 21:26:59.226 were shown in yellow in the results.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 61,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:22 AM

Posted 28 April 2012 - 10:26 AM

Hi looks like something is tracking you,, I cannot see it.. So repost your original topic in a new topic.
We need a deeper look. Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run skip it and move on.

Let me know if that went well.
How do I get help? Who is helping me?
Staying Updated Calendar of Updates.
For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....
Become a BleepingComputer fan: Facebook Have you seen..Select Real Security

#5 saltydog463

saltydog463

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:22 AM

Posted 28 April 2012 - 10:47 AM

MY search tells me minitoolbox is a virus. Is that so and if so why is it being recomended?

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 61,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:22 AM

Posted 28 April 2012 - 08:38 PM

I think My search is the malware. If you are referring to a search engine.

Minitoolbox was written here at NC by a member of our malware staff. Itt is used on many malware removal forums so I can promise you it is not a virus.
How do I get help? Who is helping me?
Staying Updated Calendar of Updates.
For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....
Become a BleepingComputer fan: Facebook Have you seen..Select Real Security




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users