Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antivirus Agent Pro Malware is in my computer. [Moved]


  • Please log in to reply
13 replies to this topic

#1 bongitup

bongitup

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 11 May 2009 - 03:06 PM

It keeps showing messages of how infected my comp is - the usual routine of this program. I may have a few other viruses and such that i never cleaned out from a while back. Hope you can help me.

BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,110 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:09:55 PM

Posted 11 May 2009 - 09:26 PM

As no logs have been posted, I am shifting this topic from the specialized HiJack This forum to the Am I Infected forum.

==>PLEASE DO NOT NOW POST LOGS<== unless a log is specifically requested.
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Internet Security, NoScript Firefox ext.


animinionsmalltext.gif

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,565 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:55 PM

Posted 11 May 2009 - 09:44 PM

Hello and welcome!

Next run MBAM:

Please download Malwarebytes Anti-Malware (v1.36) and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.


Follow with Run ATF and SAS:
From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 bongitup

bongitup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 12 May 2009 - 04:43 AM

I downloaded MBAM from the alternative link 2, ran the software and found over 400 corrupted objects. I deleted them all and rebooted normally. I then went to paste the log file on the message board. I again couldn't access web pages. I diagnosed my connection and got the reply " Your HTTP, HTTPS, FTP ports may be blocked by your firewall." I then proceeded to turn off my firewall and the problem persisted. I switched user accounts to the other adminastrative user name Deelish and attempted a connection. When i diagnose the connection it says the connection has been repaired. It now works but only on this user name. I ran MBAM on this user name and found almost 50 more threats.

The Antivirus Agent Pro messages are gone. Also Sys32.DLL isn't running on startup in my task manager anymore. All seems fine besides my internet access.

This is the log from my first scan followed by my second scan results. I have not deleted the files from the second scan yet, not being sure i will be able to access the internet again. Also i have not yet downloaded ATFcleaner or SuperAntiSpyware. Thank you for your time and patience.



Malwarebytes' Anti-Malware 1.36
Database version: 2112
Windows 5.1.2600 Service Pack 3

5/12/2009 2:56:32 AM
mbam-log-2009-05-12 (02-56-31).txt

Scan type: Quick Scan
Objects scanned: 111287
Time elapsed: 21 minute(s), 9 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 4
Registry Keys Infected: 199
Registry Values Infected: 19
Registry Data Items Infected: 3
Folders Infected: 34
Files Infected: 205

Memory Processes Infected:
C:\WINDOWS\system32\SYS32DLL.exe (Worm.Koobface) -> Unloaded process successfully.
C:\WINDOWS\system32\SYS32DLL.exe (Worm.Koobface) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\system32\efbqcsaa.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\796525\796525.dll (Trojan.BHO) -> Delete on reboot.
C:\Program Files\MyWebSearch\SrchAstt\1.bin\MWSSRCAS.DLL (Adware.MyWeb) -> Delete on reboot.
C:\WINDOWS\system32\tpfwici.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gncvzzfv (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bbd4551a-9b23-41cd-9bcd-818aa2da7b63} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{bbd4551a-9b23-41cd-9bcd-818aa2da7b63} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{e63648f7-3933-440e-b4f6-a8584dd7b7eb} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{f7d09218-46d7-4d3d-9b7f-315204cd0836} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e7f15ac4-e0a9-43f0-921b-70dfea621220} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{e7f15ac4-e0a9-43f0-921b-70dfea621220} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e7f15ac4-e0a9-43f0-921b-70dfea621220} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWeb) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWeb) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWeb) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWeb) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.datacontrol (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{c8cecde3-1ae1-4c4a-ad82-6d5b00212144} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{17de5e5e-bfe3-4e83-8e1f-8755795359ec} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{1f52a5fa-a705-4415-b975-88503b291728} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.datacontrol.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.historykillerscheduler (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{8ca01f0e-987c-49c3-b852-2f1ac4a7094c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{1093995a-ba37-41d2-836e-091067c4ad17} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{120927bf-1700-43bc-810f-fab92549b390} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{247a115f-06c2-4fb3-967d-2d62d3cf4f0a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{3e53e2cb-86db-4a4a-8bd9-ffeb7a64df82} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{90449521-d834-4703-bb4e-d3aa44042ff8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{991aac62-b100-47ce-8b75-253965244f69} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{bbabdc90-f3d5-4801-863a-ee6ae529862d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d6ff3684-ad3b-48eb-bbb4-b9e6c5a355c1} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{eb9e5c1c-b1f9-4c2b-be8a-27d6446fdaf8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0f8ecf4f-3646-4c3a-8881-8e138ffcaf70} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b813095c-81c0-4e40-aa14-67520372b987} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c9d7be3e-141a-4c85-8cd6-32461f3df2c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{cff4ce82-3aa2-451f-9b77-7165605fb835} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.historykillerscheduler.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.historyswattercontrolbar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.historyswattercontrolbar.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.htmlmenu (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{e47caee0-deea-464a-9326-3f2801535a4d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{3e1656ed-f60e-4597-b6aa-b6a58e171495} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{98d9753d-d73b-42d5-8c85-4469cda897ab} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{98d9753d-d73b-42d5-8c85-4469cda897ab} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{98d9753d-d73b-42d5-8c85-4469cda897ab} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.htmlmenu.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.htmlmenu.2 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.iecookiesmanager (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.iecookiesmanager.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.killerobjmanager (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.killerobjmanager.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.popswatterbarbutton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{8e6f1830-9607-4440-8530-13be7c4b1d14} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{63d0ed2b-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{63d0ed2d-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8e6f1832-9607-4440-8530-13be7c4b1d14} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a9571378-68a1-443d-b082-284f960c6d17} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.popswatterbarbutton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.popswattersettingscontrol (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.popswattersettingscontrol.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.shellviewcontrol (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{621feacd-8857-43a6-ae26-451d670d5370} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2763e333-b168-41a0-a112-d35f96f410c0} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2eff3cf7-99c1-4c29-bc2b-68e057e22340} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2eff3cf7-99c1-4c29-bc2b-68e057e22340} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{2eff3cf7-99c1-4c29-bc2b-68e057e22340} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\funwebproducts.shellviewcontrol.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\malwarealarm.webinstall (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\c:/windows/downloaded program files/webinst.dll (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{7543fbd5-2279-4d03-8f29-eb21531fa2fe} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\malwarealarm.webinstall.1 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.htmlpanel (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{3e720450-b472-4954-b7aa-33069eb53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{3e720451-b472-4954-b7aa-33069eb53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{3e720453-b472-4954-b7aa-33069eb53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3e720452-b472-4954-b7aa-33069eb53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3e720452-b472-4954-b7aa-33069eb53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{3e720452-b472-4954-b7aa-33069eb53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.htmlpanel.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.outlookaddin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{adb01e81-3c79-4272-a0f1-7b2be7a782dc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.outlookaddin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.pseudotransparentplugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{7473d290-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{7473d291-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{7473d293-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{7473d295-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{7473d297-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7473d292-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7473d294-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7473d296-b7bb-4f24-ae82-7e2ce94bb6a9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.pseudotransparentplugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchtoolbar.settingsplugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{07b18ea0-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{07b18eaa-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{07b18eac-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{07b18ea3-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{53ced2d0-5e9a-4761-9005-648404e6f7e5} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchtoolbar.settingsplugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchtoolbar.toolbarplugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchtoolbar.toolbarplugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\screensavercontrol.screensaverinstaller (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{29d67d3c-509a-4544-903f-c8c1b8236554} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2e3537fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{938aa51a-996c-4884-98ce-80dd16a5c9da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\screensavercontrol.screensaverinstaller.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\y537.y537mgr (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\y537.y537mgr.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{459f4226-1aab-43b6-9dc1-b6313ef83749} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{6e74766c-4d93-4cc0-96d1-47b8e07ff9ca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{de38c398-b328-4f4c-a3ad-1b5e4ed93477} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e342af55-b78a-4cd0-a2bb-da7f52d9d25e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e342af55-b78a-4cd0-a2bb-da7f52d9d25f} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2a5c2e6d-864b-4f2c-9542-8b272741d78b} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{6f520be0-9b54-4558-816f-224e67997df3} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1E0DE227-5CE4-4ea3-AB0C-8B03E1AA76BC} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{84da4fdf-a1cf-4195-8688-3e961f505983} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{d9fffb27-d62a-4d64-8cec-1ff006528805} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{0d26bc71-a633-4e71-ad31-eadc3a1b6a3a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{f42228fb-e84e-479e-b922-fbbd096e792c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{4a3d609a-43b8-4406-b793-84f244246325} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4b18dd50-c996-44fc-ac52-0fecff82ed58} (Spyware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{ed8525ea-2bfc-4440-bd8a-20efb9d5e541} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2178f3fb-2560-458f-bdee-631e2fe0dfe4} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b5141620-c2b2-4d95-9f0f-134d99c87ab0} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{54a3f8b7-228e-4ed8-895b-de832b2c3959} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{53e0b6e8-a51d-448b-b692-40b67b285543} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{90b5a95a-afd5-4d11-b9bd-a69d53d22226} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\568267acfc5644dab06f058006ddbae3 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{bbd4551a-9b23-41cd-9bcd-818aa2da7b63} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\orkpyaox (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\orkpyaox (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\orkpyaox (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\System Doctor Free (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\seekmo (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\aldd (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\webinst.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\jkwslist (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\uwap7.pcheck.1 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\winantivirus pro 2007 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyWebSearch bar Uninstall (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins\MyWebSearch.OutlookAddin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Word\Addins\MyWebSearch.OutlookAddin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AdvancedCleaner Free (Rogue.Advanced.Cleaner) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mywebsearch email plugin (Adware.MyWeb) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWeb) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\Downloaded Program Files\webinst.dll (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmstray (Worm.KoobFace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Salestart (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemDoctor Free (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system tool (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysldtray (Worm.Koobface) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ADP (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\ (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootStera (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media\WMSDK\Sources\f3PopularScreensavers (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SYS32DLL (Worm.KoobFace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\regfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\Common Files\WinAntiVirus Pro 2007 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2007 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2007\Data (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\Logs (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\Logs (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\VirusHeal 4.2 (Rogue.VirusHeal) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SalesMonitor (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SalesMonitor\Data (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\MyWebSearch\bar\1.bin (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\MyWebSearch\bar\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\SrchAstt (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\MyWebSearch\SrchAstt\1.bin (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Installr (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Installr\2.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\VirusProtect 3.9 (Rogue.VirusProtect) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\System Doctor Free (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\System Doctor Free (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\System Doctor Free\Logs (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\System Doctor Free (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\System Doctor Free\Logs (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec (Stolen.Data) -> Delete on reboot.
C:\WINDOWS\system32\796525 (Trojan.BHO) -> Delete on reboot.

Files Infected:
c:\WINDOWS\system32\tpfwici.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ddcyx.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xycdd.bak1 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xycdd.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dpqwvyil.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\liyvwqpd.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dsbxfuut.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tuufxbsd.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eimowrlg.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\glrwomie.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iagybtns.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sntbygai.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iatbkwln.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nlwkbtai.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mllmj.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jmllm.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mmlkqoqk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kqoqklmm.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pmnnk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\knnmp.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\skevcwiq.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qiwcveks.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\usypilii.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iilipysu.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vfebvuet.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\teuvbefv.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yecopryv.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vyrpocey.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\efbqcsaa.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\iehelper.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\MWSOESTB.DLL (Adware.MyWeb) -> Delete on reboot.
C:\Program Files\MyWebSearch\bar\1.bin\MWSOEMON.EXE (Adware.MyWeb) -> Delete on reboot.
C:\WINDOWS\system32\SYS32DLL.exe (Worm.Koobface) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\796525\796525.dll (Trojan.BHO) -> Delete on reboot.
C:\Program Files\MyWebSearch\SrchAstt\1.bin\MWSSRCAS.DLL (Adware.MyWeb) -> Delete on reboot.
C:\Program Files\MyWebSearch\bar\1.bin\F3DTACTL.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3HISTSW.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3HTMLMU.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3POPSWT.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3SHLLVW.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\webinst.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3HTML.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3OUTLCN.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3SKIN.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\MWSBAR.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3SCRCTR.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\Companion Wizard\WapCHK.dll (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3CJPEG.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3HTTPCT.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\MWSOEPLG.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fyvxtwof.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\aulveiim.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bapqimxu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ceuqofhc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dfnfhcvm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dkhpvntv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dondajht.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dooqrmuh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dyujlihh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eiebhipe.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\haukuory.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hefwphux.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\horsfbjf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ibkykcn.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\irudqgkh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jaxhqlqn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kgjwjcxi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kicltdxh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\maxliusn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nyvgsodl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mhpbfotr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\odidpxxr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ovkwjukc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qjbyiwin.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qluponyx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qptdxcyb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qqphxiyk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qsvybjhc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rxpfeywj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rywrkdsj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tgyeefjm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tiiedigp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uljtikce.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vjycdpfd.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vphybmbn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wkeuawlm.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vuafbdyw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vwgyvsvm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wacrsokl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ydiegrqw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lgdakide.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qurxtjun.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yhiyofjf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yiuunmri.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ymnmoaht.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\husjjwps.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\miuxnofg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\WinAntiVirusPro2007FreeInstall.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Local Settings\Temporary Internet Files\Content.IE5\G2OB2EXU\cmp638[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Local Settings\Temporary Internet Files\Content.IE5\UHKC7DL9\scnd[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\8J3RB0OF\nfr[1].exe (Worm.Koobface) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\G57AIZHF\6244[1].exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\WinAntiVirus Pro 2007\err.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2007\Data\Abbr (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2007\Data\ActivationCode (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2007\Data\ProductCode (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\avtasks.dat (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\history.db (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\History.db-journal (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\PGE.dat (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\Logs\wa7Support.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\WinAntiVirus Pro 2007\Logs\winav.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\avtasks.dat (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\history.db (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\PGE.dat (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\Logs\update.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\Logs\wa7Support.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\WinAntiVirus Pro 2007\Logs\winav.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\VirusHeal 4.2\antispy.vh (Rogue.VirusHeal) -> Quarantined and deleted successfully.
C:\Program Files\VirusHeal 4.2\blacklist.txt (Rogue.VirusHeal) -> Quarantined and deleted successfully.
C:\Program Files\VirusHeal 4.2\VirusHeal 4.2.url (Rogue.VirusHeal) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3BKGERR.JPG (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3PSSAVR.SCR (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3REPROX.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3RESTUB.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3SCHMON.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3SPACER.WMV (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3WALLPP.DAT (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\F3WPHOOK.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3FFXTBR.JAR (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3FFXTBR.MANIFEST (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3IDLE.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3NTSTBR.JAR (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3PLUGIN.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\M3SKPLAY.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\NPMYWEBS.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00027536 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00037DBC (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\001976DC.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\001977C6.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00197862.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0019793D.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\001979D9.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00197A56.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00197AF3.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00197B7F.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0029FD73 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\005F35F6 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C525 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C6AC.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C757.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C7F4.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C890.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C91D.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\00F0C9C8.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0338E372 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\03EE3635.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0828CCE9 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0828CD94 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\files.ini (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game\CHECKERS.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game\CHESS.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game\REVERSI.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History\search2 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\prevcfg2.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\setting2.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\setting2.htm.bak (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\settings.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\settings.dat.bak (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Installr\2.bin\F3EZSETP.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images\0129997C.urr (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\CursorManiaBtn-new.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\CursorManiaBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\MailStampBtn-new.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\MailStampBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\MySignatureInsertBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\MySignaturePreviewBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\MyStationeryBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\SmileyCentralBtn-new.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\SmileyCentralBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\VirusProtect 3.9\blacklist.txt (Rogue.VirusProtect) -> Quarantined and deleted successfully.
C:\Program Files\VirusProtect 3.9\VirusProtect 3.9.url (Rogue.VirusProtect) -> Quarantined and deleted successfully.
C:\Program Files\VirusProtect 3.9\vp.dat (Rogue.VirusProtect) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Application Data\System Doctor Free\Logs\update.log (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\System Doctor Free\Logs\update.log (Rogue.SystemDoctor) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\local.ds (Stolen.Data) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds (Stolen.Data) -> Delete on reboot.
C:\WINDOWS\msmark2.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\WINDOWS\t55ft2695f44.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\WINDOWS\mstre18.exe (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\sysguard.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\ld08.exe (Worm.Koobface) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\f3PSSavr.scr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM231aa6fd.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM231aa6fd.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sdra64.exe (Trojan.FakeAlert) -> Delete on reboot.
C:\Documents and Settings\Deelish\Local Settings\Temp\laf1.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Deelish\Favorites\Online Security Test.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nqtwa.bak1 (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nqtwa.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\stera.job (Rogue.WinAntivirus) -> Quarantined and deleted successfully.




Second scan results from other Username.


Malwarebytes' Anti-Malware 1.36
Database version: 2114
Windows 5.1.2600 Service Pack 3

5/12/2009 5:26:32 AM
mbam-log-2009-05-12 (05-26-09).txt

Scan type: Quick Scan
Objects scanned: 111189
Time elapsed: 21 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 36
Registry Values Infected: 5
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\efbqcsaa.dll (Trojan.Vundo.H) -> No action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gncvzzfv (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{002f0599-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{002f0599-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{003c1c44-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{003c1c44-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{005e0b33-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{005e0b33-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{002f0599-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{003c1c44-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{005e0b33-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4b18dd50-c996-44fc-ac52-0fecff82ed58} (Spyware.Hotbar) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2178f3fb-2560-458f-bdee-631e2fe0dfe4} (Rogue.WinAntivirus) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b5141620-c2b2-4d95-9f0f-134d99c87ab0} (Rogue.WinAntivirus) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{54a3f8b7-228e-4ed8-895b-de832b2c3959} (Adware.Zango) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{bfc08cff-c737-4433-bd5a-0ee7efcfee54} (Adware.Zango) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{53e0b6e8-a51d-448b-b692-40b67b285543} (Adware.180Solutions) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{deceaaa2-370a-49bb-9362-68c3a58ddc62} (Adware.180Solutions) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Trymedia Systems (Adware.Trymedia) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affltid (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\aldd (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Juan (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\winantivirus pro 2007 (Rogue.WinAntivirus) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> No action taken.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\ (Adware.Hotbar) -> No action taken.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\tpfwici.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\efbqcsaa.dll (Trojan.Vundo.H) -> No action taken.

Edited by bongitup, 12 May 2009 - 05:04 AM.


#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,565 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:55 PM

Posted 12 May 2009 - 03:35 PM

Hello, a lot of infection here.. The No Action taken , means I have to ask ..did you click on Remove selected?? alsoif you haven't reboot bfore proceeding.
Please run the ATF and SAS next post that log . Then check for an update and rerun the MBAM.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 bongitup

bongitup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 12 May 2009 - 11:59 PM

Holy infection batman! Here is another 1000 infections after running SuperAntiSpyware. When i ran ATF cleaner it freed up half a gig. When i ran MBAM the first time i missed the update. The second scan was with the updated version. I also ran MBAM with the most current update and deleted all infections found. I then ran SuperAntiSpyware on my original username Gail and found even more infections. This log is the last one. Will get back to you on that. Thank you for your patience again.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/13/2009 at 00:34 AM

Application Version : 4.26.1002

Core Rules Database Version : 3890
Trace Rules Database Version: 1838

Scan type : Complete Scan
Total Scan Time : 01:49:16

Memory items scanned : 222
Memory threats detected : 2
Registry items scanned : 5094
Registry threats detected : 95
File items scanned : 88548
File threats detected : 969

Adware.Vundo/Variant-MSFake
C:\WINDOWS\SYSTEM32\TPFWICI.DLL
C:\WINDOWS\SYSTEM32\TPFWICI.DLL

Trojan.Downloader-CREW
C:\WINDOWS\SYSTEM32\EFBQCSAA.DLL
C:\WINDOWS\SYSTEM32\EFBQCSAA.DLL
HKLM\Software\Classes\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}\InprocServer32
HKCR\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{000F0711-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{000F0711-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{000F0711-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32
HKCR\CLSID\{000F0711-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{001782CC-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{001782CC-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{001782CC-3A70-4242-93C3-C9CCF72AA005}\InprocServer32
HKCR\CLSID\{001782CC-3A70-4242-93C3-C9CCF72AA005}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{001E0E22-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{001E0E22-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{001E0E22-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32
HKCR\CLSID\{001E0E22-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{002F0599-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{002F0599-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{002F0599-3A70-4242-93C3-C9CCF72AA005}\InprocServer32
HKCR\CLSID\{002F0599-3A70-4242-93C3-C9CCF72AA005}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{003C1C44-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{003C1C44-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{003C1C44-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32
HKCR\CLSID\{003C1C44-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{005E0B33-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{005E0B33-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{005E0B33-3A70-4242-93C3-C9CCF72AA005}\InprocServer32
HKCR\CLSID\{005E0B33-3A70-4242-93C3-C9CCF72AA005}\InprocServer32#ThreadingModel
HKLM\Software\Classes\CLSID\{00783889-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{00783889-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{00783889-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32
HKCR\CLSID\{00783889-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000BC166-3A70-4242-93C3-C9CCF72AA005}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000F0711-E226-41D1-8AE2-B61F2CFDD8E0}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{001782CC-3A70-4242-93C3-C9CCF72AA005}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{001E0E22-E226-41D1-8AE2-B61F2CFDD8E0}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{002F0599-3A70-4242-93C3-C9CCF72AA005}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{003C1C44-E226-41D1-8AE2-B61F2CFDD8E0}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{005E0B33-3A70-4242-93C3-C9CCF72AA005}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00783889-E226-41D1-8AE2-B61F2CFDD8E0}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{000BC166-3A70-4242-93C3-C9CCF72AA005}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{000F0711-E226-41D1-8AE2-B61F2CFDD8E0}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{001782CC-3A70-4242-93C3-C9CCF72AA005}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{001E0E22-E226-41D1-8AE2-B61F2CFDD8E0}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{002F0599-3A70-4242-93C3-C9CCF72AA005}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{003C1C44-E226-41D1-8AE2-B61F2CFDD8E0}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{005E0B33-3A70-4242-93C3-C9CCF72AA005}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00783889-E226-41D1-8AE2-B61F2CFDD8E0}

Trojan.WinFixer
HKLM\Software\Classes\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}
HKCR\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}
HKCR\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}\InprocServer32
HKCR\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\GEEDC.DLL
HKLM\Software\Classes\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}
HKCR\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}
HKCR\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}\InprocServer32
HKCR\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\JKKJI.DLL
HKLM\Software\Classes\CLSID\{F5429B41-DE18-457B-A742-BB47FD089688}
HKCR\CLSID\{F5429B41-DE18-457B-A742-BB47FD089688}
HKCR\CLSID\{F5429B41-DE18-457B-A742-BB47FD089688}\InprocServer32
HKCR\CLSID\{F5429B41-DE18-457B-A742-BB47FD089688}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\VTSTU.DLL

Adware.Vundo Variant
HKLM\Software\Classes\CLSID\{85E87403-237B-420F-9927-FA990D94EE41}
HKCR\CLSID\{85E87403-237B-420F-9927-FA990D94EE41}
HKCR\CLSID\{85E87403-237B-420F-9927-FA990D94EE41}\InprocServer32
HKCR\CLSID\{85E87403-237B-420F-9927-FA990D94EE41}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\VTSQP.DLL
HKLM\Software\Classes\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}
HKCR\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}
HKCR\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}\InprocServer32
HKCR\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\AWTQN.DLL
HKLM\Software\Classes\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}
HKCR\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}
HKCR\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}\InprocServer32
HKCR\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\AWTQO.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{96848813-0DC2-40EB-967B-A8A4AD67DED7}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{85E87403-237B-420F-9927-FA990D94EE41}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{96848813-0DC2-40EB-967B-A8A4AD67DED7}

Adware.Vundo/Variant-Joke
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}#Version
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}#Flags
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}\InprocServer32
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}\InprocServer32#ThreadingModel
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\gncvzzfv

Adware.MyWebSearch
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{07B18EA9-A523-4961-B6BB-170DE4475CCA}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Internet Explorer\URLSearchHooks#{00A6FAF6-072E-44cf-8957-5838F569A31D}

Adware.HotBar/ShopperReports (Low Risk)
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}

Adware.Tracking Cookie
C:\Documents and Settings\Deelish\Cookies\deelish@doubleclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xxxpower[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.itv[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@metareward[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter12.sextracker[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@zedo[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www2.addfreestats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@nextag[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@server.cpmstar[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.burstbeacon[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@fastclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.adengage[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@edge.ru4[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@webpower[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bleepingfreemovies[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adknowledge[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexsearchcom[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@atwola[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-youtube.hitbox[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@insightexpresserdd[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@69553378[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@a.websponsors[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@eyewonder[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.streetfire[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mywebsearch[5].txt
C:\Documents and Settings\Deelish\Cookies\deelish@onlinerewardcenter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@animalsex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.xxxasiandesire[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@anat.tacoda[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sales.liveperson[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cgm.adbureau[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@overture[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@programs.wegcash[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@apmebf[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cgi-bin[6].txt
C:\Documents and Settings\Deelish\Cookies\deelish@enhance[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pornstarclassics[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@dist.belnk[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@revenue[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@i.screensavers[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.xxxkey[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@anad.tacoda[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@wt.sexsearch[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@movieland[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bluestreak[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@entrepreneur.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats.gamestop[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@entrepreneur[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bannerspace[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@yieldmanager[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@da-tracking[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@specificclick[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stat.dealtime[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads2.drivelinemedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@icc.intellisrv[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adrevolver[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@oddcast[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tribalfusion[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.adbrite[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@citi.bridgetrack[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www7.addfreestats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mediaplex[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hg1.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adlegend[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@toplist[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@targetnet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@couplesseduceteens[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cs.sexcounter[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adopt.specificclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@nbads[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@interclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www5.addfreestats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@store.adultstorefront[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@animalbleepers[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@herfirstanalsex[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@casalemedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@c.goclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-gamespyinc.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-sonycomputer.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@burstnet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultfriendfinder[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tracking.g3x[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.marchmedia.8k[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@questionmarket[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@maxserving[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tacoda[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@realmedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@perf.overture[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@azjmp[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@affiliate.wordtracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.crakmedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@largegirlsxxx[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@revsci[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads3.blastro[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.usacasino[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bs.serving-sys[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hotlog[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@atdmt[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultrevenueservice[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexshorties[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@m1.webstats4u[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stat.onestat[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.banner-farm[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@roiservice[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.animalsex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.passiondollars[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tradedoubler[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@trafficmp[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.pointroll[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[5].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www6.addfreestats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@itxt.vibrantmedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.addfreestats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.adrevolver[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@collective-media[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stanzapub.advertserve[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hc2.humanclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@statcounter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.gamesbannernet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad.yieldmanager[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@statse.webtrendslive[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cgi-bin[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-dig.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adecn[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@valueclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hardcoresex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@phg.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@serving-sys[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.gamesbanner[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@optimize.indieclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@advertising[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.sexsearchcom[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@a.websponsors[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.consumersdiscountrx[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hearstmagazines.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@badassteens[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.pstats[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@kontera[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter15.sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@scottrade.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@nepajobfinder[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.revsci[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pro-market[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter7.sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@aba.insightcommerce[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenpinkvideos[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[6].txt
C:\Documents and Settings\Deelish\Cookies\deelish@statsgod[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cz4.clickzs[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@eas.apm.emediate[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenslikeitbig[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[9].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.adrevolver[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad.ifrance[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@errclean[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@247realmedia[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.addynamix[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad1.clickhype[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@secure.advancedcleaner[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter4.sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mediamgr.ugo[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@3.adbrite[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tour.teenslikeitbig[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@dmtracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@youporn[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@metacafe.122.2o7[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adtech[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cracked[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.monster[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@oasn04.247realmedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@traffic.esearchnetwork[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@4.adbrite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@rotator.adjuggler[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.burstnet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[8].txt
C:\Documents and Settings\Deelish\Cookies\deelish@findarticles[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@insightexpressai[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.urbanreach[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[7].txt
C:\Documents and Settings\Deelish\Cookies\deelish@richmedia.yahoo[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@reunion.adbureau[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@findwhat[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@advancedcleaner[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter3.sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@affiliatetracking[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@msnportal.112.2o7[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexlist[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.flashgames247[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@findlinks.addresses[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter14.sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porn365[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.bridgetrack[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.ebony-bleeping[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teeniefiles[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.advancedcleaner[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.gmodules[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ylwbook.findlinks.addresses[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@secure.errclean[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@vhost.oddcast[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www8.addfreestats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.chicagoreader[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adinterax[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad2networks.advertserve[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@goclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@anheuserbusch.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter.hitslink[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@2.marketbanker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adnetserver[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tour.sexsearchcom[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adopt.euroclick[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bannerads.zwire[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@precisionclick[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad2.doublepimp[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads-dev.youporn[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@yadro[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bet.burstnet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.madisonavenue[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media6degrees[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@wichen.freeadultboards[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@findabbwlover[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adbrite[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.nepajobfinder[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@image.masterstats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[10].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.bleepingcomputer[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.bleepbot[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@208.122.40[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@winantivirus[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenandpanties[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tremor.adbureau[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bannerads.zwire[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.nakedsologirls[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mediamgr.ugo[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter9.sextracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[11].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.telefragged[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@trannybleeped[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porn[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@findlaw[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hulu.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cache.trafficmp[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultadworld[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@a.findarticles[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hardwarezone[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.porn365[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats1.reliablestats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.porn[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porndirt[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@prospect.adbureau[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.mediamayhemcorp[3].txt
.www.macromedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.yadro.ru [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.yourdailymedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.xiti.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.yieldmanager.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.xxxmsncam.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.screensavers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.teensforcash.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.teensforcash.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.oldfartbleeping.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.pstats.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.fantasyfinder.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.marchmedia.8k.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.marchmedia.8k.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.animalsex.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.burstbeacon.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.accountlink.pncbank.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.windowsmedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.banner-farm.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.banner-farm.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.wt.sexsearchcom.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.trailertrashxxx.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.try.screensavers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.toplist.cz [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.teenyboppers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.try.starware.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.store.adultstorefront.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stattrack.0catch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stattrack.0catch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.channel4.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.manticoretechnology.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.ahacafe.net [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.ahacafe.net [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.gamestop.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.server.cpmstar.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.server.cpmstar.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.server.cpmstar.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.sexybleepgames.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.sexzool.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.serving.rpowermedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.teensforcash.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.screensavers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.shopica.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.regalinteractive.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.redorbit.healthology.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.redorbit.healthology.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.regalinteractive.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.qnsr.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.pornspinner.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.partner2profit.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.oddcast.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.oads.cracked.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.myaccounts.navyfcu.org [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.media.mtvnservices.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.media.mtvnservices.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
advancedcleaner.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
winantivirus.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
C:\Documents and Settings\Deelish\Cookies\deelish@15minutesfree.nakedsword[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@1xxx.cqcounter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@2.adbrite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@2.go.globaladsales[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@2.marketbanker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@247realmedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@3.adbrite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@3animalsex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@4.adbrite[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad.contentmedianetwork[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad.doubleclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad.zanox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ad1.clickhype[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adbrite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adinterax[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@admin.teenrevenue[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adnetserver[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adnetwork.engineseeker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adopt.euroclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adopt.hbmediapro[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.adbrite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.addynamix[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.adengage[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.adultswim[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.associatedcontent[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.boardgamegeek[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.bridgetrack[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.carpassion[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.cc214142[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.cnn[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.gamershell[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.glispa[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.gmodules[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.goyk[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.joinaxxess[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.jokeroo[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.mediamayhemcorp[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.monster[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.neodelight[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.newgrounds[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.pointroll[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.realtechnetwork[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.revsci[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.strongcoders[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.telegraph.co[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.thestar[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.treehugger[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.urban-rivals[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads.vidsense[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ads4.blastro[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adserver.adreactor[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adserver.easyad[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adserver.mpogonline[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adserver.zeads[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adsrevenue[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adtech[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultadworld[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultcams[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultfriendfinder[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultsheepfinder[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adultswim[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adv.surinter[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adv.webmd[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@adverticum[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@affiliate.budsinc[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@allrealityxxxpass[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@angiexxx[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@animalsex-planet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@anm.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@apmebf[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@as-eu.falkag[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@as1.falkag[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@asiancrackaddiction[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@asianxxx[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@atdmt[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ath.belnk[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@atlas.entrepreneur[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@audit.median[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.32vegas[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.cdpoker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.clubdicecasino[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.eurogrand[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banner.joylandcasino[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bannerads.zwire[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bannerads[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banners.adultfriendfinder[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banners.battleon[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banners.cams[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@banners2.battleon[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@barepicturesxxx[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bbs.adultwebmasterinfo[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bbwxxx[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@belnk[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bfast[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bigcocksex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bigcockteenaddiction[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bizrate[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bnr.targetpoint[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bravenetmedianetwork[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bravenet[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@brightcove.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@buycom.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cartoonnetwork.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cassava[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cbs.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cgm.adbureau[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@classifiedventures1.112.2o7[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@clevermedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.fantasypromotion[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.payserve[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.seventeencash[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.theadultery[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.xxxofferz[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@click.zoopartners[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@clickaider[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@clickbank[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@clicksor[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@clicktorrent[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cneteurope.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cnn.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@collective-media[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@coreg.azoogleads[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@count4.exitexchange[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter.auctionworks[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter.hitslink[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter.inkfrog[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter.mycomputer[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter1.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter10.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter12.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter14.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter15.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter2.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter4.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter5.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter6.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter7.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@counter9.sextracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@couplesseduceteens[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@coxhsi.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cpvfeed[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cracked[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@crackinterview[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@crackmuffin[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@creamofbleep[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cts.metricsdirect[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cz4.clickzs[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cz5.clickzs[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cz7.clickzs[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@cz8.clickzs[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@dailynewmedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@data.coremetrics[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@data1.perf.overture[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@data2.perf.overture[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@data3.perf.overture[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@devart.adbureau[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@discountrealitysites[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@e-2dj6wjkoeldpekp.stats.esomniture[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@eas.apm.emediate[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@easyadservice[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@edge.ru4[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-associatednewmedia.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-attworldnet.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-cafepress.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-cbs.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-comcast.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-crain.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-digg.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-esa.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-fastweb.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-foxmovies.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-foxsports.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-gamedaily.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-gamespot.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-globalgamingleague.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-guba.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-idgentertainment.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-ifilm.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-ignitemedia.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-knightridder.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-legonewyorkinc.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-lionsgate.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-maxim.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-mindshare.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-mobizzo.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-nestleusainc.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-newscientist.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-nfusiongroup.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-overseenet.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-pfizer.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-space.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-traderpublishing.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-verizon.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-verizoncommunications.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-viacom.hitbox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-warnerbrothers.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ehg-youtube.hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@electronicarts.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@emarketmakers[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@enhance[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@entrepreneur.us.intellitxt[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@ero-advertising[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@eroticlick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@exitexchange[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@eyewonder[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@eztracks.aavalue[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@falkag[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@fastclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@fastclick[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@filthytoonbleepers[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@findwhat[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@focalex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@fortunecity[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@free.wegcash[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@freepornlessons[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bleepingmachines[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bleepspy[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@bleepthebabysitter[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@galleries.adult-empire[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@galleries.soloteengirls[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@giftscom.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@goclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@grannybleeping[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@h.starware[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hardporn[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@heavycom.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hentaicounter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@highbeam.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hitbox[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@homestore.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hornyblackmothers[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hornygamer[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hornymatches[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@hotbar[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@iacas.adbureau[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@image.masterstats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@imeem.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@incredimailltd.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@indexstats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@indextools[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@insightexpressai[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@insightexpress[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@iteens[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@join.porndvddirect[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@kanoodle[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@keywordmax[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@kmpads[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@kontera[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@live.adultcams[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@livedealcom.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@login.tracking101[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@lynxtrack[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@m1.webstats.motigo[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@malwarecrush[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@marthastewart.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@masternewmedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@maxim.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mcclatchy.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.adrevolver[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.hotels[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.licenseacquisition[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.licenseacquisition[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.mtvnservices[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media.www.dailytexanonline[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@media6degrees[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mediabum[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mediamgr.ugo[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@medianewsgroup[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mediaonenetwork[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mebleepyoulongtime[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@metacafe.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@msnportal.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@myaccounts.navyfcu[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mydaughtersbleepingablackdude[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mymomsbleepingblackzilla[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mywebsearch[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mywebsearch[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@mywebsearch[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@newlinecinema.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@newmediaexplorer[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@newsinteractive.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@non-nude-teens[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@oads.cracked[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@offeroptimizer[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@offers.clickbooth[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@oldfartbleepin[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@optimize.indieclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@orgysexparties[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pacificpoker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pacificpoker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@partner2profit[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@partners.adultadworld[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@partygaming.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@partypoker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@path.pureadstracking[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@paycounter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@paypal.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pch.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@plumperporn.smut[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porn365[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porn613[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porn613[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@porndvddirect[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pornhost[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pornoground[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pornspinner[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pornstarslikeitbig[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pornstudsearch[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@precisionclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@precisionclick[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@pro-market[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@publishers.clickbooth[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@qksrv[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@qnsr[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@redoctane.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@redorbit.healthology[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@reduxads.valuead[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@regalinteractive[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@registercom.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@romancetracker[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@rotator.adjuggler[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@s.clickability[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@scan.malwarecrush[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@scan.malwarecrush[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@screensavers[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@scripts.sunporno[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@server.iad.liveperson[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@server.iad.liveperson[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@server.iad.liveperson[4].txt
C:\Documents and Settings\Deelish\Cookies\deelish@serving-sys[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@serving.rpowermedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sex.ku4a[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexclips[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexlist[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexsearchcom[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sextosexty[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexybleepgames[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexyroundasses[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sexzool[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@skinperfection.securemediabox[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@soloteengirls[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sonycorporate.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@spamblockerutility[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@specificclick[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stanzapub.advertserve[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stat.errclean[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats.adbrite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats.ahacafe[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats.channel4[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats.manticoretechnology[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats.sphere[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stats2.reliablestats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@statsgod[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stattrack.0catch[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@stpetersburgtimes.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@superstats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@sweetteencandy[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tagiq.clickforensics[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tdstats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenandpanties[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenburg[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teensforcash[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenslutbus[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenteenteen[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenybopperclub[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@teenyboppers[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@thesexydump[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@top.free-adult-anime[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@top.free-adult-anime[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@toplist[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@toseeka[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tour.pornstarslikeitbig[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@track.searchignite[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@traffic.buyservices[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@trafficgigolos[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@trailertrashxxx[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tremor.adbureau[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@trinitymirror.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@tripod[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@try.screensavers[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@try.starware[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@twci.coremetrics[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@twelvefifteen[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@usatoday1.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@vhost.oddcast[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@viaatomvideo.112.2o7[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@viacomedycentralrl.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@viamtvcom.112.2o7[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@virginteenlesbians[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@warlog[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@waterfrontmedia.112.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@web4.realtracker[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@wildbleeptoys[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@windowsmedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@wrigley.122.2o7[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@wt.sexsearchcom[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.accountlink.pncbank[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.adult-empire[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.adultplayersclub[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.blackxxxporno[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.burstnet[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.cashstrappedteens[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.clickxchange[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.clubdogsex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.couplesseduceteens[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.couplesseduceteens[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.dailynewmedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.entrepreneur[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.extreme-animalsex[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.fantasyfinder[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.freebeastsex[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.gamesbanner[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.getsexgames[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.googleadservices[3].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.icountclicks[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.jouwstats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.macromedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.masternewmedia[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.mediabum[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.nudeteenphoto[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.oddcast[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.oldfartbleeping[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.orgysexparties[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.bleepbot[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.popuptraffic[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.porn365[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.porndownloadreview[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.pornojunkies[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.pornoverview[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.pstats[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.rowise[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.screensavers[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.smartadserver[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.stats.tso.co[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.stats.tso.co[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.teeniesxxx[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.teensforcash[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.teensforcash[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.teenstitsandass[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.teentitsass[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.tqlkg[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.virginteenlesbians[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.w3counter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.xxxasiansite[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.xxxmsncam[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.xxxpower[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.xxxproposal[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.yourdailymedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www.zanox-affiliate[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www2.everythingfreeporn[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www3.addfreestats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@www8.addfreestats[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xiti[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xml.bravenetmedianetwork[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xxx.ku4a[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xxxcounter[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xxxproposal[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@xxxsupersize[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@yadro[1].txt
C:\Documents and Settings\Deelish\Cookies\deelish@yourdailymedia[2].txt
C:\Documents and Settings\Deelish\Cookies\deelish@z1.adserver[1].txt
.imrworldwide.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
.imrworldwide.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
advancedcleaner.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
winantivirus.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
C:\Documents and Settings\Owner\Cookies\owner@a1.interclick[2].txt
C:\Documents and Settings\Owner\Cookies\owner@ad.yieldmanager[1].txt
C:\Documents and Settings\Owner\Cookies\owner@ad2.doublepimp[1].txt
C:\Documents and Settings\Owner\Cookies\owner@adbrite[1].txt
C:\Documents and Settings\Owner\Cookies\owner@ads.bleepingcomputer[2].txt
C:\Documents and Settings\Owner\Cookies\owner@adultfriendfinder[2].txt
C:\Documents and Settings\Owner\Cookies\owner@advertising[1].txt
C:\Documents and Settings\Owner\Cookies\owner@apmebf[1].txt
C:\Documents and Settings\Owner\Cookies\owner@atdmt[1].txt
C:\Documents and Settings\Owner\Cookies\owner@banner509[1].txt
C:\Documents and Settings\Owner\Cookies\owner@bs.serving-sys[1].txt
C:\Documents and Settings\Owner\Cookies\owner@casalemedia[1].txt
C:\Documents and Settings\Owner\Cookies\owner@chitika[2].txt
C:\Documents and Settings\Owner\Cookies\owner@dmtracker[1].txt
C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt
C:\Documents and Settings\Owner\Cookies\owner@hornypharaoh[2].txt
C:\Documents and Settings\Owner\Cookies\owner@hornypharaoh[3].txt
C:\Documents and Settings\Owner\Cookies\owner@interclick[2].txt
C:\Documents and Settings\Owner\Cookies\owner@kontera[2].txt
C:\Documents and Settings\Owner\Cookies\owner@lovebleepk[1].txt
C:\Documents and Settings\Owner\Cookies\owner@media6degrees[1].txt
C:\Documents and Settings\Owner\Cookies\owner@mediaplex[2].txt
C:\Documents and Settings\Owner\Cookies\owner@mywebsearch[1].txt
C:\Documents and Settings\Owner\Cookies\owner@onlinerewardcenter[2].txt
C:\Documents and Settings\Owner\Cookies\owner@pbid.pro-market[2].txt
C:\Documents and Settings\Owner\Cookies\owner@pornhub[1].txt
C:\Documents and Settings\Owner\Cookies\owner@pro-market[2].txt
C:\Documents and Settings\Owner\Cookies\owner@revenue[2].txt
C:\Documents and Settings\Owner\Cookies\owner@revsci[2].txt
C:\Documents and Settings\Owner\Cookies\owner@rotator.adjuggler[1].txt
C:\Documents and Settings\Owner\Cookies\owner@serving-sys[1].txt
C:\Documents and Settings\Owner\Cookies\owner@smartadserver[2].txt
C:\Documents and Settings\Owner\Cookies\owner@tacoda[1].txt
C:\Documents and Settings\Owner\Cookies\owner@toseeka[2].txt
C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[1].txt
C:\Documents and Settings\Owner\Cookies\owner@www.pornhub[1].txt
C:\Documents and Settings\Owner\Cookies\owner@www.sexorigin[1].txt
C:\Documents and Settings\Owner\Cookies\owner@www.toseeka[1].txt
C:\Documents and Settings\Owner\Cookies\owner@xiti[1].txt
C:\Documents and Settings\Owner\Cookies\owner@yourporn-xmovies[1].txt
C:\Documents and Settings\Owner\Cookies\owner@zedo[2].txt

Trojan.WinAntiSpyware/WinAntiVirus 2006/2007
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\WinAntiVirus Pro 2007
C:\UWA7P\Quar
C:\WINDOWS\..\UWA7P
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\NI.UWA7P_0001_N99M1502\SETUP.EXE

Adware.MyWebSearch/FunWebProducts
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\SOFTWARE\FunWebProducts
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\SOFTWARE\MyWebSearch

Adware.Vundo Variant/Rel
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\aldd
HKU\S-1-5-21-2437707645-3878641263-1327713641-1007\Software\Microsoft\rdfa
C:\WINDOWS\SYSTEM32\ADEEG.INI
C:\WINDOWS\SYSTEM32\HHKMP.INI
C:\WINDOWS\SYSTEM32\IHKMP.INI
C:\WINDOWS\SYSTEM32\IJLLM.INI
C:\WINDOWS\SYSTEM32\NQTWA.INI2
C:\WINDOWS\SYSTEM32\OPQSS.INI
C:\WINDOWS\SYSTEM32\ORQSS.BAK2
C:\WINDOWS\SYSTEM32\ORQSS.INI
C:\WINDOWS\SYSTEM32\STUTV.BAK1
C:\WINDOWS\SYSTEM32\STUTV.INI
C:\WINDOWS\SYSTEM32\UVVWA.BAK1
C:\WINDOWS\SYSTEM32\UVVWA.INI
C:\WINDOWS\SYSTEM32\XBADD.BAK1
C:\WINDOWS\SYSTEM32\YYBEG.INI

Unclassified.LoaderX
C:\DOCUMENTS AND SETTINGS\DEELISH\MY DOCUMENTS\UNZIPPED\APOCALYPSE_2_\APOCALYPSE\LOADERX.EXE
C:\RECYCLER\S-1-5-21-2437707645-3878641263-1327713641-1007\DC7\APOCALYPSE\LOADERX.EXE

Adware.SysGuard/FakeAlert-C
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\33.EXE

Adware.Vundo-Variant/Small-A
C:\WINDOWS\SYSTEM32\AARHYGWS.DLL
C:\WINDOWS\SYSTEM32\AEOOVHRK.DLL
C:\WINDOWS\SYSTEM32\AGPJLDXD.DLL
C:\WINDOWS\SYSTEM32\ASUACCPS.DLL
C:\WINDOWS\SYSTEM32\BABKXAOY.DLL
C:\WINDOWS\SYSTEM32\BECSNNFY.DLL
C:\WINDOWS\SYSTEM32\BKBOBTGX.DLL
C:\WINDOWS\SYSTEM32\DGBDTCEB.DLL
C:\WINDOWS\SYSTEM32\DIERRWGH.DLL
C:\WINDOWS\SYSTEM32\DMQLPTJX.DLL
C:\WINDOWS\SYSTEM32\DTGCEALH.DLL
C:\WINDOWS\SYSTEM32\EALJVOIY.DLL
C:\WINDOWS\SYSTEM32\EQBCAJMW.DLL
C:\WINDOWS\SYSTEM32\FNQSUWQY.DLL
C:\WINDOWS\SYSTEM32\GGXCMJBW.DLL
C:\WINDOWS\SYSTEM32\GHMHSVHL.DLL
C:\WINDOWS\SYSTEM32\GQUIQFXD.DLL
C:\WINDOWS\SYSTEM32\GREJCEJE.DLL
C:\WINDOWS\SYSTEM32\HPBOIDKU.DLL
C:\WINDOWS\SYSTEM32\HSQWIOEK.DLL
C:\WINDOWS\SYSTEM32\IMAYTMLN.DLL
C:\WINDOWS\SYSTEM32\INEHLQGR.DLL
C:\WINDOWS\SYSTEM32\KACLBUGK.DLL
C:\WINDOWS\SYSTEM32\KFODQKHE.DLL
C:\WINDOWS\SYSTEM32\KYOODDEA.DLL
C:\WINDOWS\SYSTEM32\LXODNOJR.DLL
C:\WINDOWS\SYSTEM32\MASTJQGV.DLL
C:\WINDOWS\SYSTEM32\MNIITKXI.DLL
C:\WINDOWS\SYSTEM32\OAYYXAAP.DLL
C:\WINDOWS\SYSTEM32\OLBNVAQK.DLL
C:\WINDOWS\SYSTEM32\OLCKVDUT.DLL
C:\WINDOWS\SYSTEM32\OYQPMNQI.DLL
C:\WINDOWS\SYSTEM32\PHTMOGWA.DLL
C:\WINDOWS\SYSTEM32\PJDUDFIR.DLL
C:\WINDOWS\SYSTEM32\PWEQOPTB.DLL
C:\WINDOWS\SYSTEM32\QHKWHKBS.DLL
C:\WINDOWS\SYSTEM32\QMCPFRPK.DLL
C:\WINDOWS\SYSTEM32\RVIPUEFJ.DLL
C:\WINDOWS\SYSTEM32\SOLOMTTK.DLL
C:\WINDOWS\SYSTEM32\SPTJVAQA.DLL
C:\WINDOWS\SYSTEM32\VNIPSAXR.DLL
C:\WINDOWS\SYSTEM32\VOWSMTLF.DLL
C:\WINDOWS\SYSTEM32\WSWDHONH.DLL
C:\WINDOWS\SYSTEM32\XRCNHYKO.DLL
C:\WINDOWS\SYSTEM32\XVBDWPLH.DLL
C:\WINDOWS\SYSTEM32\YEWCKCHC.DLL
C:\WINDOWS\SYSTEM32\YHPDBUPU.DLL
C:\WINDOWS\SYSTEM32\YWLUUUDP.DLL

Trojan.Vundo-Variant/F
C:\WINDOWS\SYSTEM32\ABHHQHSV.DLL
C:\WINDOWS\SYSTEM32\AIQDUFHY.DLL
C:\WINDOWS\SYSTEM32\BIRGNUWM.DLL
C:\WINDOWS\SYSTEM32\CIRGRBEV.DLL
C:\WINDOWS\SYSTEM32\DSUPXQFQ.DLL
C:\WINDOWS\SYSTEM32\DWQIFEIL.DLL
C:\WINDOWS\SYSTEM32\EYBBTSMH.DLL
C:\WINDOWS\SYSTEM32\FQMBVMFV.DLL
C:\WINDOWS\SYSTEM32\GCJHQORU.DLL
C:\WINDOWS\SYSTEM32\JHOJSAQR.DLL
C:\WINDOWS\SYSTEM32\JYNHYGGG.DLL
C:\WINDOWS\SYSTEM32\KMODGHXK.DLL
C:\WINDOWS\SYSTEM32\LIOESVOT.DLL
C:\WINDOWS\SYSTEM32\NNANTDFV.DLL
C:\WINDOWS\SYSTEM32\NPJFXMGP.DLL
C:\WINDOWS\SYSTEM32\OHGRLRVX.DLL
C:\WINDOWS\SYSTEM32\PECNRGMC.DLL
C:\WINDOWS\SYSTEM32\PQXQAKOL.DLL
C:\WINDOWS\SYSTEM32\RGLCYCGJ.DLL
C:\WINDOWS\SYSTEM32\RWATTCLX.DLL
C:\WINDOWS\SYSTEM32\SWDICHPN.DLL
C:\WINDOWS\SYSTEM32\TBMFXXRH.DLL
C:\WINDOWS\SYSTEM32\UNNGFDMG.DLL
C:\WINDOWS\SYSTEM32\UOTEKRHI.DLL
C:\WINDOWS\SYSTEM32\WBOOTUSM.DLL
C:\WINDOWS\SYSTEM32\WLNTRTSN.DLL
C:\WINDOWS\SYSTEM32\WMJOXHMN.DLL
C:\WINDOWS\SYSTEM32\WQWBVPNG.DLL
C:\WINDOWS\SYSTEM32\WXYAIOHS.DLL
C:\WINDOWS\SYSTEM32\XHIHFWCJ.DLL
C:\WINDOWS\SYSTEM32\XKXDHGTQ.DLL
C:\WINDOWS\SYSTEM32\YEBTNIJI.DLL
C:\WINDOWS\SYSTEM32\YTWRDWJL.DLL

Adware.Vundo-Variant
C:\WINDOWS\SYSTEM32\FXOQTQSD.DLL
C:\WINDOWS\SYSTEM32\IEDDDPBG.DLL
C:\WINDOWS\SYSTEM32\KGOOFCFF.DLL
C:\WINDOWS\SYSTEM32\LIBWTKGM.DLL
C:\WINDOWS\SYSTEM32\NUGTINLO.DLL
C:\WINDOWS\SYSTEM32\PHEFINYR.DLL
C:\WINDOWS\SYSTEM32\PQFEHHEI.DLL
C:\WINDOWS\SYSTEM32\RNOTDFQA.DLL

Adware.HotBar (Low Risk)
C:\WINDOWS\SYSTEM32\NCPXCKHV.EXE

Trace.Known Threat Sources
C:\Documents and Settings\Deelish\Local Settings\Temporary Internet Files\Content.IE5\3W45NDWE\logo[3].gif
C:\Documents and Settings\Deelish\Local Settings\Temporary Internet Files\Content.IE5\3W45NDWE\top_line[1].gif
C:\Documents and Settings\Deelish\Local Settings\Temporary Internet Files\Content.IE5\3W45NDWE\detect[1].htm
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CHIKY6EC\shopica_logo_bott[1].gif
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CHIKY6EC\style[1].css
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\J6SIELEY\sp[1].gif
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\G57AIZHF\js[1].js
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\J6SIELEY\footer_dots[1].gif
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\J6SIELEY\search[2].htm
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\8J3RB0OF\shopica_logo_top[1].gif
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CHIKY6EC\favicon[2].ico



MBAM LOG



Malwarebytes' Anti-Malware 1.36
Database version: 2119
Windows 5.1.2600 Service Pack 3

5/13/2009 1:57:24 AM
mbam-log-2009-05-13 (01-57-24).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 148444
Time elapsed: 45 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 48
Registry Values Infected: 5
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\efbqcsaa.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gncvzzfv (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000bc166-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{000bc166-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000f0711-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{000f0711-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{001782cc-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{001782cc-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{001e0e22-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{001e0e22-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{002f0599-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{002f0599-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{003c1c44-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{003c1c44-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{005e0b33-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{005e0b33-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{000bc166-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{000f0711-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{001782cc-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{001e0e22-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{002f0599-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{003c1c44-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{005e0b33-3a70-4242-93c3-c9ccf72aa005} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00783889-e226-41d1-8ae2-b61f2cfdd8e0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4b18dd50-c996-44fc-ac52-0fecff82ed58} (Spyware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2178f3fb-2560-458f-bdee-631e2fe0dfe4} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b5141620-c2b2-4d95-9f0f-134d99c87ab0} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{54a3f8b7-228e-4ed8-895b-de832b2c3959} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{bfc08cff-c737-4433-bd5a-0ee7efcfee54} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{53e0b6e8-a51d-448b-b692-40b67b285543} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{deceaaa2-370a-49bb-9362-68c3a58ddc62} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Trymedia Systems (Adware.Trymedia) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\aldd (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\winantivirus pro 2007 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\ (Adware.Hotbar) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\tpfwici.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\efbqcsaa.dll (Trojan.Vundo.H) -> Delete on reboot.



Username Gail Log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/13/2009 at 02:36 AM

Application Version : 4.26.1002

Core Rules Database Version : 3868
Trace Rules Database Version: 1816

Scan type : Quick Scan
Total Scan Time : 00:09:55

Memory items scanned : 339
Memory threats detected : 2
Registry items scanned : 688
Registry threats detected : 40
File items scanned : 6887
File threats detected : 203

Adware.Vundo/Variant-MSFake
C:\WINDOWS\SYSTEM32\TPFWICI.DLL
C:\WINDOWS\SYSTEM32\TPFWICI.DLL

Trojan.Downloader-CREW
C:\WINDOWS\SYSTEM32\EFBQCSAA.DLL
C:\WINDOWS\SYSTEM32\EFBQCSAA.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00078388-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{00078388-E226-41D1-8AE2-B61F2CFDD8E0}
HKCR\CLSID\{00078388-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32
HKCR\CLSID\{00078388-E226-41D1-8AE2-B61F2CFDD8E0}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000BC166-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}
HKCR\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}\InprocServer32
HKCR\CLSID\{000BC166-3A70-4242-93C3-C9CCF72AA005}\InprocServer32#ThreadingModel
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00078388-E226-41D1-8AE2-B61F2CFDD8E0}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{000BC166-3A70-4242-93C3-C9CCF72AA005}

Adware.Vundo Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{96848813-0DC2-40EB-967B-A8A4AD67DED7}
HKCR\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}
HKCR\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}\InprocServer32
HKCR\CLSID\{96848813-0DC2-40EB-967B-A8A4AD67DED7}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\AWTQN.DLL
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{96848813-0DC2-40EB-967B-A8A4AD67DED7}
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}
HKCR\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}
HKCR\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}\InprocServer32
HKCR\CLSID\{9993B35B-00A0-49FE-B4AD-2A8BDB413184}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\AWTQO.DLL

Adware.Vundo/Variant-Joke
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}#Version
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}#Flags
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}\InprocServer32
HKCR\CLSID\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}\InprocServer32#ThreadingModel
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{ABBB7F80-13F0-4F55-A213-1824C8DA454B}
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\gncvzzfv

Adware.HotBar/ShopperReports (Low Risk)
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}

Trojan.WinFixer
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}
HKCR\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}
HKCR\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}\InprocServer32
HKCR\CLSID\{7B7C96AB-6778-481C-B9C4-DB884EECBD0E}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\GEEDC.DLL
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DA1ACB5D-305B-418F-B193-D80534824E53}
HKCR\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}
HKCR\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}\InprocServer32
HKCR\CLSID\{DA1ACB5D-305B-418F-B193-D80534824E53}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\JKKJI.DLL

Trojan.WinAntiSpyware/WinAntiVirus 2006/2007
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Run#uwa7pcw [ "C:\Program Files\Common Files\WinAntiVirus Pro 2007\uwa7pcw.exe" -c ]
C:\UWA7P\Quar
C:\WINDOWS\..\UWA7P

Adware.MyWebSearch/FunWebProducts
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\SOFTWARE\FunWebProducts

Adware.Zango/ShoppingReport
HKU\S-1-5-21-2437707645-3878641263-1327713641-1003\Software\Microsoft\Windows\CurrentVersion\Run#WeatherDPA [ "C:\Program Files\Hotbar\bin\10.0.356.0\Weather.exe" -auto ]
C:\Documents and Settings\Owner\Application Data\WeatherDPA\Weather\log.txt
C:\Documents and Settings\Owner\Application Data\WeatherDPA\Weather\WeatherDPA\Weather_XML
C:\Documents and Settings\Owner\Application Data\WeatherDPA\Weather\WeatherDPA
C:\Documents and Settings\Owner\Application Data\WeatherDPA\Weather\WeatherStartup.xml
C:\Documents and Settings\Owner\Application Data\WeatherDPA\Weather
C:\Documents and Settings\Owner\Application Data\WeatherDPA

Adware.Tracking Cookie
.www.macromedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.couplesseduceteens.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.yadro.ru [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.yourdailymedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.xiti.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.yieldmanager.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.xxxmsncam.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.screensavers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.teensforcash.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.teensforcash.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.oldfartbleeping.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.pstats.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.fantasyfinder.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.marchmedia.8k.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.marchmedia.8k.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.animalsex.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.burstbeacon.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.accountlink.pncbank.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.windowsmedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.banner-farm.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.banner-farm.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.wt.sexsearchcom.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.trailertrashxxx.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.try.screensavers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.toplist.cz [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.teenyboppers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.try.starware.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.store.adultstorefront.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stattrack.0catch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stattrack.0catch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.channel4.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.manticoretechnology.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.ahacafe.net [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.ahacafe.net [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.stats.gamestop.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.server.cpmstar.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.server.cpmstar.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.server.cpmstar.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.sexybleepgames.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.sexzool.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.serving.rpowermedia.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.www.teensforcash.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.screensavers.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.shopica.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.regalinteractive.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.redorbit.healthology.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.redorbit.healthology.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.regalinteractive.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.qnsr.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.pornspinner.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.offers.clickbooth.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.partner2profit.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.oddcast.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.oads.cracked.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.mywebsearch.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.myaccounts.navyfcu.org [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.media.mtvnservices.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
.media.mtvnservices.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
advancedcleaner.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
winantivirus.com [ C:\Documents and Settings\Deelish\Application Data\Mozilla\Firefox\Profiles\0j30gtmd.default\cookies.txt ]
C:\Documents and Settings\Deelish\Local Settings\Temp\Cookies\deelish@ads.bleepingcomputer[1].txt
C:\Documents and Settings\Deelish\Local Settings\Temp\Cookies\deelish@doubleclick[2].txt
.imrworldwide.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
.imrworldwide.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
advancedcleaner.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]
winantivirus.com [ C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\k6hklaqn.default\cookies.txt ]

Unclassified.LoaderX
C:\DOCUMENTS AND SETTINGS\DEELISH\MY DOCUMENTS\UNZIPPED\APOCALYPSE_2_\APOCALYPSE\LOADERX.EXE

Adware.Vundo-Variant/Small-A
C:\WINDOWS\SYSTEM32\AARHYGWS.DLL
C:\WINDOWS\SYSTEM32\ASUACCPS.DLL
C:\WINDOWS\SYSTEM32\AEOOVHRK.DLL
C:\WINDOWS\SYSTEM32\AGPJLDXD.DLL
C:\WINDOWS\SYSTEM32\BABKXAOY.DLL
C:\WINDOWS\SYSTEM32\BECSNNFY.DLL
C:\WINDOWS\SYSTEM32\BKBOBTGX.DLL
C:\WINDOWS\SYSTEM32\DGBDTCEB.DLL
C:\WINDOWS\SYSTEM32\DIERRWGH.DLL
C:\WINDOWS\SYSTEM32\DMQLPTJX.DLL
C:\WINDOWS\SYSTEM32\DTGCEALH.DLL
C:\WINDOWS\SYSTEM32\EALJVOIY.DLL
C:\WINDOWS\SYSTEM32\EQBCAJMW.DLL
C:\WINDOWS\SYSTEM32\FNQSUWQY.DLL
C:\WINDOWS\SYSTEM32\GGXCMJBW.DLL
C:\WINDOWS\SYSTEM32\GHMHSVHL.DLL
C:\WINDOWS\SYSTEM32\GQUIQFXD.DLL
C:\WINDOWS\SYSTEM32\GREJCEJE.DLL
C:\WINDOWS\SYSTEM32\HPBOIDKU.DLL
C:\WINDOWS\SYSTEM32\HSQWIOEK.DLL
C:\WINDOWS\SYSTEM32\IMAYTMLN.DLL
C:\WINDOWS\SYSTEM32\INEHLQGR.DLL
C:\WINDOWS\SYSTEM32\KACLBUGK.DLL
C:\WINDOWS\SYSTEM32\KFODQKHE.DLL
C:\WINDOWS\SYSTEM32\KYOODDEA.DLL
C:\WINDOWS\SYSTEM32\LXODNOJR.DLL
C:\WINDOWS\SYSTEM32\MASTJQGV.DLL
C:\WINDOWS\SYSTEM32\MNIITKXI.DLL
C:\WINDOWS\SYSTEM32\OAYYXAAP.DLL
C:\WINDOWS\SYSTEM32\OLBNVAQK.DLL
C:\WINDOWS\SYSTEM32\OLCKVDUT.DLL
C:\WINDOWS\SYSTEM32\OYQPMNQI.DLL
C:\WINDOWS\SYSTEM32\PHTMOGWA.DLL
C:\WINDOWS\SYSTEM32\PJDUDFIR.DLL
C:\WINDOWS\SYSTEM32\PWEQOPTB.DLL
C:\WINDOWS\SYSTEM32\QHKWHKBS.DLL
C:\WINDOWS\SYSTEM32\QMCPFRPK.DLL
C:\WINDOWS\SYSTEM32\RVIPUEFJ.DLL
C:\WINDOWS\SYSTEM32\SOLOMTTK.DLL
C:\WINDOWS\SYSTEM32\SPTJVAQA.DLL
C:\WINDOWS\SYSTEM32\VNIPSAXR.DLL
C:\WINDOWS\SYSTEM32\VOWSMTLF.DLL
C:\WINDOWS\SYSTEM32\WSWDHONH.DLL
C:\WINDOWS\SYSTEM32\XRCNHYKO.DLL
C:\WINDOWS\SYSTEM32\XVBDWPLH.DLL
C:\WINDOWS\SYSTEM32\YEWCKCHC.DLL
C:\WINDOWS\SYSTEM32\YHPDBUPU.DLL
C:\WINDOWS\SYSTEM32\YWLUUUDP.DLL

Trojan.Vundo-Variant/F
C:\WINDOWS\SYSTEM32\ABHHQHSV.DLL
C:\WINDOWS\SYSTEM32\AIQDUFHY.DLL
C:\WINDOWS\SYSTEM32\BIRGNUWM.DLL
C:\WINDOWS\SYSTEM32\CIRGRBEV.DLL
C:\WINDOWS\SYSTEM32\DSUPXQFQ.DLL
C:\WINDOWS\SYSTEM32\DWQIFEIL.DLL
C:\WINDOWS\SYSTEM32\EYBBTSMH.DLL
C:\WINDOWS\SYSTEM32\FQMBVMFV.DLL
C:\WINDOWS\SYSTEM32\GCJHQORU.DLL
C:\WINDOWS\SYSTEM32\JHOJSAQR.DLL
C:\WINDOWS\SYSTEM32\JYNHYGGG.DLL
C:\WINDOWS\SYSTEM32\KMODGHXK.DLL
C:\WINDOWS\SYSTEM32\LIOESVOT.DLL
C:\WINDOWS\SYSTEM32\NNANTDFV.DLL
C:\WINDOWS\SYSTEM32\NPJFXMGP.DLL
C:\WINDOWS\SYSTEM32\OHGRLRVX.DLL
C:\WINDOWS\SYSTEM32\PECNRGMC.DLL
C:\WINDOWS\SYSTEM32\PQXQAKOL.DLL
C:\WINDOWS\SYSTEM32\RGLCYCGJ.DLL
C:\WINDOWS\SYSTEM32\RWATTCLX.DLL
C:\WINDOWS\SYSTEM32\SWDICHPN.DLL
C:\WINDOWS\SYSTEM32\TBMFXXRH.DLL
C:\WINDOWS\SYSTEM32\UNNGFDMG.DLL
C:\WINDOWS\SYSTEM32\UOTEKRHI.DLL
C:\WINDOWS\SYSTEM32\WBOOTUSM.DLL
C:\WINDOWS\SYSTEM32\WLNTRTSN.DLL
C:\WINDOWS\SYSTEM32\WMJOXHMN.DLL
C:\WINDOWS\SYSTEM32\WQWBVPNG.DLL
C:\WINDOWS\SYSTEM32\XKXDHGTQ.DLL
C:\WINDOWS\SYSTEM32\WXYAIOHS.DLL
C:\WINDOWS\SYSTEM32\XHIHFWCJ.DLL
C:\WINDOWS\SYSTEM32\YEBTNIJI.DLL
C:\WINDOWS\SYSTEM32\YTWRDWJL.DLL

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\ADEEG.INI
C:\WINDOWS\SYSTEM32\HHKMP.INI
C:\WINDOWS\SYSTEM32\IHKMP.INI
C:\WINDOWS\SYSTEM32\IJLLM.INI
C:\WINDOWS\SYSTEM32\NQTWA.INI2
C:\WINDOWS\SYSTEM32\OPQSS.INI
C:\WINDOWS\SYSTEM32\ORQSS.BAK2
C:\WINDOWS\SYSTEM32\ORQSS.INI
C:\WINDOWS\SYSTEM32\STUTV.BAK1
C:\WINDOWS\SYSTEM32\STUTV.INI
C:\WINDOWS\SYSTEM32\UVVWA.BAK1
C:\WINDOWS\SYSTEM32\UVVWA.INI
C:\WINDOWS\SYSTEM32\XBADD.BAK1
C:\WINDOWS\SYSTEM32\YYBEG.INI

Adware.Vundo-Variant
C:\WINDOWS\SYSTEM32\FXOQTQSD.DLL
C:\WINDOWS\SYSTEM32\IEDDDPBG.DLL
C:\WINDOWS\SYSTEM32\KGOOFCFF.DLL
C:\WINDOWS\SYSTEM32\LIBWTKGM.DLL
C:\WINDOWS\SYSTEM32\NUGTINLO.DLL
C:\WINDOWS\SYSTEM32\PHEFINYR.DLL
C:\WINDOWS\SYSTEM32\PQFEHHEI.DLL
C:\WINDOWS\SYSTEM32\RNOTDFQA.DLL

Adware.HotBar (Low Risk)
C:\WINDOWS\SYSTEM32\NCPXCKHV.EXE

Edited by bongitup, 13 May 2009 - 01:52 AM.


#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,565 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:55 PM

Posted 13 May 2009 - 08:50 PM

Ok first ...To the Batcave for you! You are not suppposed to have ALL the malware.

Reboot if you haven't then update and sacn ..its at 2128 or so.
Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Now run SDFix:
Please print out and follow these instructions: "How to use SDFix". <- This program is for Windows 2000/XP ONLY.
When using this tool, you must use the Administrator's account or an account with "Administrative rights"
  • Disconnect from the Internet and temporarily disable your anti-virus, script blocking and any real time protection programs before performing a scan.
  • When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt.
  • If SDFix is unable to run after rebooting from Safe Mode, run SDFix in either Mode, and type F, then press Enter for it to finish the final stage and produce the report.
  • Please copy and paste the contents of Report.txt in your next reply.
  • Be sure to renable you anti-virus and and other security programs before connecting to the Internet.
-- If the computer has been infected with the VirusAlert! malware warning from the clock and the Start Menu icons or drives are not visible, open the SDFix folder, right-click on either the XP_VirusAlert_Repair.inf or W2K VirusAlert_Repair.inf (depending on your version of Windows) and select Install from the Context menu. Then reboot to apply the changes.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 bongitup

bongitup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 13 May 2009 - 11:54 PM

I ran over robin and then i ran MBAM. Heres the log with the latest update. Followed by SDfix's log. Everything ran smoothly and finished. I still can not figure out my firewall issue. I'm going to check elsewhere for a solution in the mean time. It doesn't seem to be a problem with a vrus but perhaps a bad registry key from having one. I'll edit if i find anything. Thank you for your help so far and best regards. If i had the chance i would buy you a beer.

Malwarebytes' Anti-Malware 1.36
Database version: 2128
Windows 5.1.2600 Service Pack 3

5/13/2009 11:45:11 PM
mbam-log-2009-05-13 (23-45-11).txt

Scan type: Quick Scan
Objects scanned: 101664
Time elapsed: 14 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gncvzzfv (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\tpfwici.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\Documents and Settings\Owner\Local Settings\Temp\c.exe (Trojan.Downloader) -> Quarantined and deleted successfully.




SDFix Log



SDFix: Version 1.240
Run by Deelish on Thu 05/14/2009 at 12:28 AM

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :


Restoring Default Security Values
Restoring Default Hosts File

Rebooting


Checking Files :

No Trojan Files Found






Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-14 00:40:24
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"C:\\WINDOWS\\system32\\sessmgr.exe"="C:\\WINDOWS\\system32\\sessmgr.exe:*:Disabled:@xpsp2res.dll,-22019"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

Remaining Files :



Files with Hidden Attributes :

Sat 28 Feb 2009 636,072 A.SH. --- "C:\Program Files\Internet Explorer\iexplore.exe"
Sun 13 Apr 2008 60,416 A.SH. --- "C:\Program Files\Outlook Express\msimn.exe"
Sun 13 Apr 2008 4,639 A.SH. --- "C:\Program Files\Windows Media Player\mplayer2.exe"
Wed 11 Aug 2004 73,728 A.SH. --- "C:\Program Files\Windows Media Player\wmplayer.exe"
Mon 22 Oct 2007 6,403 ..SH. --- "C:\WINDOWS\system32\hhkmp.bak2"
Wed 24 Oct 2007 56,098 ..SH. --- "C:\WINDOWS\system32\ijkkj.tmp"
Sat 6 Oct 2007 14,174 ..SH. --- "C:\WINDOWS\system32\jjkmp.bak2"
Sat 8 Dec 2007 165,025 ..SH. --- "C:\WINDOWS\system32\nqtwa.tmp"
Tue 11 Mar 2008 232,911 ..SH. --- "C:\WINDOWS\system32\nqtwa.bak2"
Fri 28 Sep 2007 6,440 ..SH. --- "C:\WINDOWS\system32\opqss.bak1"
Sun 11 Nov 2007 79,160 ..SH. --- "C:\WINDOWS\system32\pqstv.tmp"
Sat 29 Sep 2007 6,440 ..SH. --- "C:\WINDOWS\system32\yybeg.bak1"
Sat 24 Jun 2006 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Fri 8 May 2009 0 A..H. --- "C:\Documents and Settings\Owner\Local Settings\Temp\d.exe"
Sat 24 Jun 2006 4,348 ...H. --- "C:\Documents and Settings\Deelish\My Documents\My Music\License Backup\drmv1key.bak"
Mon 10 Sep 2007 20 A..H. --- "C:\Documents and Settings\Deelish\My Documents\My Music\License Backup\drmv1lic.bak"
Mon 26 Dec 2005 312 A.SH. --- "C:\Documents and Settings\Deelish\My Documents\My Music\License Backup\drmv2key.bak"
Mon 2 Oct 2006 7,003 A.SH. --- "C:\Documents and Settings\Deelish\Application Data\Roxio\Dragon\DiscInfoCache\LITE-ON__COMBO_SOHC-4836V_SG$3_300_DICV018_DRGV20100BC.TMP"

Finished!

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,565 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:55 PM

Posted 14 May 2009 - 03:13 PM

KA-Bloooey and POW!!.. Alfred thinks we still better scan. A full scan with check all accounts and drives.
What Antivirus is installed?? You could try uninstalling and reinstalling the Firewall if it is a 3rd party.
Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Full scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Now go into you Utility belt and get out DrWeb,not Dr Evil :thumbsup:


Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Edited by boopme, 14 May 2009 - 03:15 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 bongitup

bongitup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 15 May 2009 - 01:08 AM

Am going to run that software, then ill add to thihs post.




Malwarebytes' Anti-Malware 1.36
Database version: 2132
Windows 5.1.2600 Service Pack 3

5/15/2009 2:04:41 AM
mbam-log-2009-05-15 (02-04-41).txt

Scan type: Full Scan (C:\|D:\|E:\|F:\|G:\|H:\|I:\|)
Objects scanned: 156025
Time elapsed: 47 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gncvzzfv (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{abbb7f80-13f0-4f55-a213-1824c8da454b} (Trojan.Vundo.H) -> Delete on reboot.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\tpfwici.dll (Trojan.Vundo.H) -> Delete on reboot.

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,565 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:55 PM

Posted 15 May 2009 - 02:33 PM

OK ,good.. I think thr Dr will get a few more.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 bongitup

bongitup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 15 May 2009 - 04:57 PM

Well that was a mistake. I ran the Dr. and after it scanned in safe mode it gave me a black screen with only my cursor on it. Not sure if it was done or not but i lost power and restarted it. Again it gave me that screen in every mode. As a last resort i reinstalled my OS. Internet works fine and i have all my backedup files in a folder. I'm just going to assume the problems are gone to save myself the trouble of downloading/running all scans again. Thank you for your help. It is greatly appreciated. I do have one last question though. Is it possible to re-install programs from my backup files because i have lost many of the cd's? Thanks again.

#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,565 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:55 PM

Posted 15 May 2009 - 07:47 PM

OK, well reinstalling fixed all the system and registry errors created by the malwares. Did you do a format first?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 bongitup

bongitup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:55 PM

Posted 16 May 2009 - 08:52 AM

Nope. Not even sure what that means. It's alright though. Given the events and instructions you have given me all my problems are solved. I now realize i don't even need the cd's. I can just illegally download them from the interwebs. :thumbsup: My computer is in top notch performance and i just got done deleting all the aol crap that comes with the Windows OS's. I appreciate all the help. Hope you got a kick out of the infection files. Some crazy bleep in there.

Thanks for taking the time to help.





P.S. That torrent thing was a joke :flowers:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users