Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan in CD ROM drive


  • This topic is locked This topic is locked
19 replies to this topic

#1 FunFilter

FunFilter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 19 September 2010 - 04:08 PM

I procrastinated in posting this new topic to the point I put this laptop in the closet for over half a year. I really need to make sure it is repaired, but I am embarrassed because I can't comply with directive 4 above: "When posting a log please put the type of infection you have in the topic title. IE: Winfixer, Virtumonde, WinTools, WebSearch, Home Search Assistant, etc."

Last fall I began having numerous problems with the laptop including BSODs, programs starting and shuting down at will (sometimes in rapid succession), Remote Assistance and (I believe) Remote Admin were checked as exceptions in my Windows firewall (which I did not do), unrecognizable names listed in my Kaspersky rules settings for wireless networks I have used, and the final straw.... the trojan in my CD ROM drive. Kaspersky never told me I had any virus or problem, but I knew something was wrong. Finally I checked the KIS 2009 Threats and Exclusions rules and listed as an exclusion was d:/trojan.(can't remember). I really can't remember what it said, but I deleted it instantly and reran a full scan with KIS expecting it to come up. It never did. When it didn't come up in a scan, I got my removable hard drive and downloaded the files I knew were safe and proceeded to uninstall nearly every program and unnecessary file from this computer.

So, I don't know if you can help me. I ran the logs required and will post same. If I need to rerun because they are old, please advise. If you are unable to help me because I do not have the proper information, please help me uninstall dds, gmer, defogger, etc. so I can use the computer again.

Thank you in advance for your time,
Arianna



DDS (Ver_09-12-01.01) - NTFSx86
Run by Arianna at 19:51:30.12 on 02/15/2010
Internet Explorer: 8.0.6001.18882 BrowserJavaVersion: 1.6.0_18
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.848 [GMT -6:00]

SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Linksys\Linksys Updater\bin\LinksysUpdater.exe
C:\Windows\system32\spool\DRIVERS\W32X86\3\lxduserv.exe
C:\Windows\system32\lxducoms.exe
C:\Toshiba\IVP\ISM\pinger.exe
C:\Windows\system32\java.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
c:\Toshiba\IVP\swupdate\swupdtmr.exe
C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
C:\Windows\system32\TODDSrv.exe
C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmsrvc.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Toshiba\Utilities\KeNotify.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmctxth.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Lexmark 5600-6600 Series\lxdumon.exe
C:\Program Files\Lexmark 5600-6600 Series\ezprint.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
C:\Program Files\Linksys\Linksys EasyLink Advisor\Linksys EasyLink Advisor.exe
C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\Macromed\Flash\FlashUtil10e.exe
C:\Toshiba\IVP\ISM\ivpsvmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\Arianna\Desktop\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = https://login.yahoo.com/config/login_verify2?&.src=ym
uDefault_Page_URL = hxxp://www.toshibadirect.com/dpdstart
mDefault_Page_URL = hxxp://www.toshibadirect.com/dpdstart
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: IEVkbdBHO Class: {59273ab4-e7d3-40f9-a1a8-6fa9cca1862c} - c:\program files\kaspersky lab\kaspersky internet security 2009\ievkbd.dll
BHO: Lexmark Printable Web: {d2c5e510-be6d-42cc-9f61-e4f939078474} - c:\program files\lexmark printable web\bho.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No File
uRun: [TOSCDSPD] TOSCDSPD.EXE
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [ISUSPM] "c:\program files\common files\installshield\updateservice\ISUSPM.exe" -scheduler
mRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
mRun: [jswtrayutil] "c:\program files\jumpstart\jswtrayutil.exe"
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
mRun: [SmoothView] %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe
mRun: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
mRun: [NDSTray.exe] NDSTray.exe
mRun: [HWSetup] \HWSetup.exe hwSetUP
mRun: [SVPWUTIL] c:\program files\toshiba\utilities\SVPWUTIL.exe SVPwUTIL
mRun: [KeNotify] c:\program files\toshiba\utilities\KeNotify.exe
mRun: [WinampAgent] "c:\program files\winamp\winampa.exe"
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky internet security 2009\avp.exe"
mRun: [nmctxth] "c:\program files\common files\pure networks shared\platform\nmctxth.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [lxdumon.exe] "c:\program files\lexmark 5600-6600 series\lxdumon.exe"
mRun: [EzPrint] "c:\program files\lexmark 5600-6600 series\ezprint.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
StartupFolder: c:\users\arianna\appdata\roaming\micros~1\windows\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\linksy~1.lnk - c:\program files\linksys\linksys easylink advisor\Linksys EasyLink Advisor.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Add to Banner Ad Blocker - c:\program files\kaspersky lab\kaspersky internet security 2009\ie_banner_deny.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
IE: {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - {85E0B171-04FA-11D1-B7DA-00A0C90348D6} - c:\program files\kaspersky lab\kaspersky internet security 2009\SCIEPlgn.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Trusted Zone: chase.com
Trusted Zone: chase.com\www
DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} - hxxp://www2.snapfish.com/SnapfishActivia.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {C1FDEE68-98D5-4F42-A4DD-D0BECF5077EB} - hxxp://tools.ebayimg.com/eps/wl/activex/eBay_Enhanced_Picture_Control_v1-0-27-0.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} -
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: pure-go - {4746C79A-2042-4332-8650-48966E44ABA8} - c:\program files\common files\pure networks shared\platform\puresp3.dll
Notify: klogon - c:\windows\system32\klogon.dll
AppInit_DLLs: c:\progra~1\google\google~1\goec62~1.dll,c:\progra~1\kasper~1\kasper~1\mzvkbd3.dll,c:\progra~1\kasper~1\kasper~1\adialhk.dll,c:\progra~1\kasper~1\kasper~1\kloehk.dll

============= SERVICES / DRIVERS ===============

R0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [2008-1-29 33808]
R1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\drivers\jswpslwf.sys [2008-5-18 20352]
R1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\drivers\klim6.sys [2008-7-9 20496]
R2 avp;Kaspersky Internet Security;c:\program files\kaspersky lab\kaspersky internet security 2009\avp.exe -r --> c:\program files\kaspersky lab\kaspersky internet security 2009\avp.exe -r [?]
R2 ConfigFree Service;ConfigFree Service;c:\program files\toshiba\configfree\CFSvcs.exe [2007-12-25 40960]
R2 LinksysUpdater;Linksys Updater;c:\program files\linksys\linksys updater\bin\LinksysUpdater.exe [2008-2-18 204800]
R2 lxdu_device;lxdu_device;c:\windows\system32\lxducoms.exe -service --> c:\windows\system32\lxducoms.exe -service [?]
R2 lxduCATSCustConnectService;lxduCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxduserv.exe [2008-5-23 94208]
R2 TOSHIBA SMART Log Service;TOSHIBA SMART Log Service;c:\program files\toshiba\smartlogservice\TosIPCSrv.exe [2007-12-3 126976]
R3 KLFLTDEV;Kaspersky Lab KLFltDev;c:\windows\system32\drivers\klfltdev.sys [2008-3-13 26640]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-12-19 135664]
S3 FlyUsb;FLY Fusion;c:\windows\system32\drivers\FlyUsb.sys [2008-11-25 19456]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
S3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\jumpstart\jswpsapi.exe [2008-5-18 937984]
S3 PTDUBus;PANTECH UM175 Composite Device Driver ;c:\windows\system32\drivers\PTDUBus.sys [2009-5-2 33024]
S3 PTDUMdm;PANTECH UM175 Drivers;c:\windows\system32\drivers\PTDUMdm.sys [2009-5-2 41344]
S3 PTDUVsp;PANTECH UM175 Diagnostic Port;c:\windows\system32\drivers\PTDUVsp.sys [2009-5-2 39936]
S3 PTDUWWAN;PANTECH UM175 WWAN Driver;c:\windows\system32\drivers\PTDUWWAN.sys [2009-5-2 59904]
S3 SNL320XP;SONIX MULTIMEDIA USB DEVICE DRIVER;c:\windows\system32\drivers\9kdUSBXP.sys [2006-12-28 16000]

=============== Created Last 30 ================

2010-02-14 18:52:14 0 ----a-w- c:\users\arianna\defogger_reenable
2010-02-05 01:33:33 0 d-----w- c:\windows\CF055C57A98842E6BDAFE3D94C6973A8.TMP
2010-01-29 05:13:33 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_SynTP_01007.Wdf
2010-01-29 05:13:10 0 d-----w- c:\program files\Synaptics
2010-01-29 05:06:45 651264 ----a-w- c:\windows\system32\lxdupmui.dll
2010-01-29 05:06:43 376832 ----a-w- c:\windows\system32\lxducomm.dll
2010-01-29 05:06:42 364544 ----a-w- c:\windows\system32\lxducfg.exe
2010-01-29 05:06:42 208896 ----a-w- c:\windows\system32\lxdugrd.dll
2010-01-29 05:06:40 323584 ----a-w- c:\windows\system32\lxduih.exe
2010-01-29 04:47:15 2414360 ----a-w- c:\windows\system32\d3dx9_31.dll
2010-01-29 04:47:15 1892184 ----a-w- c:\windows\system32\D3DX9_42.dll
2010-01-29 04:46:18 0 d-----w- c:\program files\Winamp Detect
2010-01-28 03:35:07 0 d-----w- c:\programdata\Sun

==================== Find3M ====================

2010-02-14 19:13:04 680504 --sha-w- c:\windows\system32\drivers\fidbox.idx
2010-02-14 19:13:04 5084 --sha-w- c:\windows\system32\drivers\fidbox2.idx
2010-02-14 19:13:04 50745888 --sha-w- c:\windows\system32\drivers\fidbox.dat
2010-02-14 19:13:04 1171488 --sha-w- c:\windows\system32\drivers\fidbox2.dat
2010-02-05 01:32:46 51200 ----a-w- c:\windows\inf\infpub.dat
2010-02-05 01:32:46 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-02-05 01:32:46 143360 ----a-w- c:\windows\inf\infstor.dat
2010-01-14 17:12:06 181120 ------w- c:\windows\system32\MpSigStub.exe
2010-01-02 06:38:20 916480 ----a-w- c:\windows\system32\wininet.dll
2010-01-02 06:32:33 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-01-02 06:32:33 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-01-02 04:57:00 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2009-12-25 15:46:56 665600 ----a-w- c:\windows\inf\drvindex.dat
2009-12-25 15:46:42 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
2009-12-25 15:46:06 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
2009-12-25 02:43:20 37665 ----a-w- c:\windows\fonts\GlobalUserInterface.CompositeFont
2009-12-17 23:14:00 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-12-04 18:30:05 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2009-12-04 18:29:41 1314816 ----a-w- c:\windows\system32\quartz.dll
2009-12-04 18:28:52 22528 ----a-w- c:\windows\system32\msyuv.dll
2009-12-04 18:28:51 31744 ----a-w- c:\windows\system32\msvidc32.dll
2009-12-04 18:28:51 123904 ----a-w- c:\windows\system32\msvfw32.dll
2009-12-04 18:28:49 13312 ----a-w- c:\windows\system32\msrle32.dll
2009-12-04 18:28:27 82944 ----a-w- c:\windows\system32\mciavi32.dll
2009-12-04 18:28:21 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2009-12-04 18:27:12 91136 ----a-w- c:\windows\system32\avifil32.dll
2008-01-21 02:43:21 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-10-19 02:53:45 245760 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\ietldcache\index.dat
2008-06-19 02:50:35 14 --sh--r- c:\windows\system32\drivers\fbd.sys
2008-06-19 02:50:35 5 --sh--r- c:\windows\system32\drivers\taishop.sys
2009-07-27 14:15:34 16384 --sha-w- c:\windows\temp\low\cookies\index.dat
2009-07-27 14:15:34 32768 --sha-w- c:\windows\temp\low\history\history.ie5\index.dat
2009-07-27 14:15:34 32768 --sha-w- c:\windows\temp\low\temporary internet files\content.ie5\index.dat

============= FINISH: 19:53:17.57 ===============


Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 26 September 2010 - 07:01 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 26 September 2010 - 07:54 PM

I am here! Thank you so much. thumbup.gif

Just so you know, when I recently pulled the computer out of the closet (months after having made those scans), I updated the automatic updates that were waiting. I apologize if I wasn't supposed to do that. I won't do it again.

Arianna

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 27 September 2010 - 04:00 AM

QUOTE
I can't comply with directive 4 above: "When posting a log please put the type of infection you have in the topic title. IE: Winfixer, Virtumonde, WinTools, WebSearch, Home Search Assistant, etc."


Don't worry about identifying it, I can do that. smile.gif

The logs don't show any problems though so please run the following programs and let's see what we can find

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#5 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 28 September 2010 - 11:35 AM

Neither MBAM, nor SUPERantispyware reported anything other than tracking cookies. Should I have attached my removable hard drive where I sent all my files? I find it difficult to believe that by removing most of my files and removing most of the programs, I actually defeated the cause.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4707

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

09/28/2010 1:33:17 AM
mbam-log-2010-09-28 (01-33-17).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 335159
Time elapsed: 1 hour(s), 37 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#6 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 28 September 2010 - 11:38 AM

Here is SUPERAntiSpyware:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/28/2010 at 08:03 AM

Application Version : 4.43.1000

Core Rules Database Version : 5593
Trace Rules Database Version: 3405

Scan type : Complete Scan
Total Scan Time : 02:09:05

Memory items scanned : 848
Memory threats detected : 0
Registry items scanned : 30143
Registry threats detected : 0
File items scanned : 174195
File threats detected : 505

Adware.Tracking Cookie
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@ad.yieldmanager[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@ru4[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@adopt.specificclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@advertising[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@insightexpressai[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@ads.pointroll[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@2o7[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@atdmt[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@questionmarket[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@pointroll[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\arianna@doubleclick[1].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@ad.yieldmanager[2].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@adlegend[2].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@advertising[2].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@apmebf[1].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@bs.serving-sys[2].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@doubleclick[1].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@media6degrees[1].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@mediaplex[2].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@serving-sys[1].txt
C:\Users\Arianna\AppData\Local\Temp\Low\Cookies\arianna@socialmedia[1].txt
adults.letu.edu [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
broadcast.piximedia.fr [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
cdn4.specificclick.net [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
content.oddcast.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
googleads.g.doubleclick.net [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
interclick.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
m1.2mdn.net [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
media.socialvibe.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
objects.tremormedia.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
oddcast.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
s0.2mdn.net [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
spe.atdmt.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
speed.pointroll.com [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
static.2mdn.net [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
udn.specificclick.net [ C:\Users\Arianna\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\SL84ETJ4 ]
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@247realmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@247realmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@247realmedia[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@2o7[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@2o7[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@2o7[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@a1.interclick[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@account.live[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@acumium.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.wsod[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.wsod[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad.yieldmanager[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ad1.adtitan[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adbrite[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adinterax[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adinterax[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adknowledge[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adlegend[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adopt.specificclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adrevolver[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adrevolver[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.adap[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.addynamix[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.as4x.tmcs.ticketmaster[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.bleepingcomputer[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.bridgetrack[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.bridgetrack[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.bridgetrack[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.bridgetrack[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.bridgetrack[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.comicskingdom[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.gmodules[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.lucidmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.ogdenpubs[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.pointroll[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.pointroll[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.pointroll[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.pointroll[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.pointroll[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.pointroll[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.sun[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.undertone[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ads.widgetbucks[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adserver.adtechus[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adultedreg[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adults.letu[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@advertising[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@adxpose[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@amazonmerchants.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@apmebf[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@apmebf[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@apmebf[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@app.insightgrit[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@at.atwola[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@atdmt[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@atdmt[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@banners.sys-con[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bassproshops.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bluestreak[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bluestreak[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bravenet[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bravenet[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bravenet[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bs.serving-sys[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bs.serving-sys[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@bshg.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@burstbeacon[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@burstnet[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@burstnet[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@businessreport.advertserve[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@c7.zedo[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@care2.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@casalemedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@casalemedia[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@casalemedia[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@cdn4.specificclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@centralintermediate.centralcss[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@chitika[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@citi.bridgetrack[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@click.sevensandstone[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@clickbank[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@cms.trafficmp[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@collective-media[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@collective-media[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@content.yieldmanager[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@countrylife.lehmans[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@countryliving[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@countrystore.tabasco[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@coxhsi.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@coxhsi.112.2o7[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@coxtravelchannel.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@cratebarrel.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@currclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@currclick[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@danielhopkins.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@data.coremetrics[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@data.coremetrics[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dc.tremormedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dc.tremormedia[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dealtime[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@deluxecorp.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dminsite.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dmtracker[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dominionenterprises.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@doubleclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@doubleclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@dynamic.media.adrevolver[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wbkyundzkao.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wckiqmdzchq.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wdmisldjiko.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wfkiunczieo.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wfkokpd5ocp.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wfkyqldzkhp.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wfl4qidpclq.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wfmigmcpiap.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wgkiqnazoko.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wgkoojdzelp.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6whkiundzohq.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6whkiundzohq.stats.esomniture[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjkokhd5oko.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjkookajofo.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjkykndjwbo.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjl4enczoeo.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjlialcjacp.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjliekdjmko.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjliomc5gcp.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjliwndpwbp.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjlocjc5cbq.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjloeoazkap.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjmyqkc5chq.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjnycocpkgo.stats.esomniture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjnyoid5elq.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjnyokajchq.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wjnyqgdzweo.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@e-2dj6wmkyqidzwlp.stats.esomniture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@eas.apm.emediate[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@eb.adbureau[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@edge.ru4[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@edgeadx[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-akronbeacon.hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-findlaw.hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-gooseberry.hitbox[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-hollywoodmedia.hitbox[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-idgentertainment.hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-linksys.hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-olympus.hitbox[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-traderelectronicmedia.hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-verizon.hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-verizon.hitbox[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ehg-viacom.hitbox[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ev.ads.pointroll[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@eyewonder[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@fastclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@fastclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@fastclick[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@fastclick[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@feedads.googleadservices[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@feedads3.googleadservices[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@feedads4.googleadservices[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@findlaw[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@firstroi.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ge.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ge.112.2o7[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@gooseberry.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@gsicace.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@hearstmagazines.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@hitbox[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@hitbox[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@homeschooladnetwork[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@homeschooltracker[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@imrworldwide[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@insightexpressai[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@insightexpressai[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@interclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@interclick[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@interclick[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@invitemedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@invitemedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@invitemedia[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@invitemedia[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@invitemedia[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@k12.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@kaspersky.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@kingdigital.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@kontera[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@lawyers.findlaw[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@leeenterprises.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@lfstmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@linksynergy[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@liveperson[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@liveperson[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@liveperson[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@lulu.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@lulu.112.2o7[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@m1.webstats.motigo[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@marketlive.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@marketlive.122.2o7[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@maxmedia.educationworld[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@maxmedia.educationworld[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@maxmedia.educationworld[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@maxmedia.educationworld[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.adfrontiers[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.adfrontiers[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.adrevolver[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.adrevolver[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.adrevolver[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.expedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.sensis.com[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media.swagit[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media6degrees[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media6degrees[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media6degrees[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media6degrees[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media6degrees[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@media6degrees[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mediaplex[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@meetupcom.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@microsoftinternetexplorer.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@microsoftsto.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@microsoftwindows.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mo-media[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@movieticketscom.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@msnaccountservices.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@msnbc.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@msnportal.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@myaccount.verizonwireless[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@myaccount.verizonwireless[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@mycounter.tinycounter[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@network.realmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@nextag[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@oasn03.247realmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@oasn04.247realmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@oasn04.247realmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@oasn04.247realmedia[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@oasn04.247realmedia[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@oddcast[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@onetoone.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@overture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@overture[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@palmone.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@paypal.112.2o7[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@paypal.112.2o7[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@perf.overture[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@pointroll[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@pointroll[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@pointroll[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@pro-market[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@questionmarket[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@re-finder[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@realmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@realmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@realmedia[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@realmedia[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@rev.remnantmedianetwork[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@rev.remnantmedianetwork[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@revenue[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@revsci[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@revsci[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@revsci[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@revsci[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@richmedia.yahoo[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@roiservice[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@roiservice[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@rotator.adjuggler[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@s.clickability[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@s.clickability[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sales.liveperson[9].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@samsclub.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@server.iad.liveperson[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@server.iad.liveperson[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@server.iad.liveperson[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@server.iad.liveperson[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@server.iad.liveperson[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@server.iad.liveperson[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@serving-sys[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@serving-sys[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@serving-sys[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@serving-sys[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@serving-sys[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@serving-sys[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@sitestat.mayoclinic[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@socialmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificclick[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificclick[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificclick[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificclick[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificclick[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[10].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[11].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[7].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@specificmedia[8].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stampinup.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stat.dealtime[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@statcounter[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats.gamestop[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats.gamestop[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats.paypal[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats.paypal[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats.townnews[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats1.clicktracks[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@stats1.clicktracks[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@statse.webtrendslive[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@t.lynxtrack[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tacoda[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tacoda[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tacoda[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@target.db.advertising[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@test.coremetrics[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@thefind[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@ticketsnow.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tracking.quillion[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tracking.realtor[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tracking.realtor[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tracking.williamsburgmarketplace[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tracking.williamsburgmarketplace[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tradedoubler[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficdashboard[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficmp[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficmp[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficmp[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficmp[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficmp[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trafficmp[6].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@transunioninteractive.122.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@traveladvertising[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tribalfusion[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tribalfusion[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@tribalfusion[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@trinitymirror.112.2o7[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@videoegg.adbureau[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@videos.currclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@web4.realtracker[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@webtrack.bestsoftware[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@webtrack.bestsoftware[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.arbookfind[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.burstbeacon[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.burstnet[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.countryliving[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.countryliving[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.currclick[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.googleadservices[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.googleadservices[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.googleadservices[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.googleadservices[4].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.googleadservices[5].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.homeschooltracker[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.mlsfinder[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.mlsfinder[3].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.mo-media[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.mottmedia[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.mywebstats[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.re-finder[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@www.visitor-track[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@yieldmanager[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@yieldmanager[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@zedo[1].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@zedo[2].txt
C:\Users\Arianna\AppData\Roaming\Microsoft\Windows\Cookies\Low\arianna@zedo[4].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@2o7[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@ad.yieldmanager[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@ads.pointroll[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@adserver.adtechus[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@advertising[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@apmebf[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@atdmt[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@casalemedia[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@content.yieldmanager[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@content.yieldmanager[3].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@doubleclick[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@e-2dj6wfkyapcpgbp.stats.esomniture[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@e-2dj6wmmywidpwao.stats.esomniture[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@fastclick[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@interclick[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@media6degrees[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@microsoftwindows.112.2o7[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@msnportal.112.2o7[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@overture[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@paypal.112.2o7[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@questionmarket[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@realmedia[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@trafficmp[2].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@tribalfusion[1].txt
C:\Users\Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\patrick@yieldmanager[1].txt
C:\Users\rage\AppData\Roaming\Microsoft\Windows\Cookies\Low\rage@advertising[1].txt
C:\Users\rage\AppData\Roaming\Microsoft\Windows\Cookies\Low\rage@atdmt[1].txt
C:\Users\rage\AppData\Roaming\Microsoft\Windows\Cookies\Low\rage@doubleclick[2].txt
C:\Users\rage\AppData\Roaming\Microsoft\Windows\Cookies\Low\rage@questionmarket[2].txt
C:\Users\rage\AppData\Roaming\Microsoft\Windows\Cookies\Low\rage@specificclick[2].txt


#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 28 September 2010 - 04:44 PM

Plug the drive in and run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#8 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 28 September 2010 - 09:59 PM

The log says the Windows Defender is enabled, but I followed the directions listed. When I checked afterward, it still reports being turned off. I hope I disabled it correctly, and it did not interfere with the log.

I have resumed operation of my security programs, as you did not specifically advise me otherwise.

Arianna

ComboFix 10-09-27.05 - Arianna 09/28/2010 21:21:48.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.1005 [GMT -5:00]
Running from: c:\users\Arianna\Desktop\comfix.exe
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-08-28 to 2010-09-29 )))))))))))))))))))))))))))))))
.

2010-09-29 02:34 . 2010-09-29 02:34 -------- d-----w- c:\users\Arianna\AppData\Local\temp
2010-09-29 02:34 . 2010-09-29 02:34 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-09-28 10:35 . 2010-09-28 10:35 63488 ----a-w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-09-28 10:35 . 2010-09-28 10:35 52224 ----a-w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-09-28 10:35 . 2010-09-28 10:35 117760 ----a-w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-09-28 10:35 . 2010-09-28 10:35 -------- d-----w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com
2010-09-28 10:34 . 2010-09-28 10:35 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-09-28 04:53 . 2010-09-28 04:53 -------- d-----w- c:\users\Arianna\AppData\Roaming\Malwarebytes
2010-09-28 04:52 . 2010-04-29 20:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-28 04:52 . 2010-09-28 04:53 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-09-28 04:52 . 2010-04-29 20:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-09-17 22:04 . 2010-09-17 22:04 -------- d-----w- c:\program files\QuickTime
2010-09-17 03:44 . 2010-04-16 16:46 502272 ----a-w- c:\windows\system32\usp10.dll
2010-09-17 03:44 . 2010-08-17 14:11 128000 ----a-w- c:\windows\system32\spoolsv.exe
2010-09-17 03:44 . 2010-04-05 17:02 317952 ----a-w- c:\windows\system32\MP4SDECD.DLL
2010-09-17 03:44 . 2010-05-27 20:08 739328 ----a-w- c:\windows\system32\inetcomm.dll
2010-09-12 18:28 . 2009-11-08 15:55 99176 ----a-w- c:\windows\system32\PresentationHostProxy.dll
2010-09-12 18:28 . 2009-11-08 15:55 49472 ----a-w- c:\windows\system32\netfxperf.dll
2010-09-12 18:28 . 2009-11-08 15:55 297808 ----a-w- c:\windows\system32\mscoree.dll
2010-09-12 18:28 . 2009-11-08 15:55 295264 ----a-w- c:\windows\system32\PresentationHost.exe
2010-09-12 18:28 . 2009-11-08 15:55 1130824 ----a-w- c:\windows\system32\dfshim.dll
2010-09-12 17:45 . 2010-03-05 14:01 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-09-12 17:41 . 2010-07-17 10:00 423656 ----a-w- c:\windows\system32\deployJava1.dll
2010-09-12 17:41 . 2010-05-27 20:08 81920 ----a-w- c:\windows\system32\iccvid.dll
2010-09-12 17:39 . 2010-06-11 16:16 274944 ----a-w- c:\windows\system32\schannel.dll
2010-09-12 17:39 . 2010-04-05 17:01 67072 ----a-w- c:\windows\system32\asycfilt.dll
2010-09-12 17:38 . 2010-04-16 16:43 28672 ----a-w- c:\windows\system32\Apphlpdm.dll
2010-09-12 17:38 . 2010-04-16 14:39 4240384 ----a-w- c:\windows\system32\GameUXLegacyGDFs.dll
2010-09-12 17:38 . 2010-04-23 14:13 2048 ----a-w- c:\windows\system32\tzres.dll
2010-09-12 17:36 . 2010-05-26 14:47 289792 ----a-w- c:\windows\system32\atmfd.dll
2010-09-12 17:35 . 2010-05-26 17:06 34304 ----a-w- c:\windows\system32\atmlib.dll
2010-09-12 17:35 . 2010-06-21 13:37 2037760 ----a-w- c:\windows\system32\win32k.sys
2010-09-12 17:35 . 2010-06-18 17:31 36864 ----a-w- c:\windows\system32\rtutils.dll
2010-09-12 17:34 . 2010-06-08 17:35 3548040 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-09-12 17:34 . 2010-06-08 17:35 3600768 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-09-12 17:34 . 2010-06-11 16:15 1248768 ----a-w- c:\windows\system32\msxml3.dll
2010-09-12 17:34 . 2010-06-18 15:04 302080 ----a-w- c:\windows\system32\drivers\srv.sys
2010-09-12 17:34 . 2010-06-18 15:04 144896 ----a-w- c:\windows\system32\drivers\srv2.sys
2010-09-12 17:34 . 2010-06-16 16:04 905088 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-09-12 17:19 . 2009-12-23 11:33 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-09-12 17:17 . 2010-01-13 17:34 98304 ----a-w- c:\windows\system32\cabview.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-28 15:00 . 2009-06-09 02:53 5756 --sha-w- c:\windows\system32\drivers\fidbox2.idx
2010-09-28 15:00 . 2009-06-09 02:53 1368096 --sha-w- c:\windows\system32\drivers\fidbox2.dat
2010-09-28 15:00 . 2008-06-19 04:06 680504 --sha-w- c:\windows\system32\drivers\fidbox.idx
2010-09-28 15:00 . 2008-06-19 04:06 50745888 --sha-w- c:\windows\system32\drivers\fidbox.dat
2010-09-22 20:48 . 2008-09-10 00:01 1356 ----a-w- c:\users\Arianna\AppData\Local\d3d9caps.dat
2010-09-17 04:07 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-09-13 01:56 . 2008-02-21 01:59 -------- d-----w- c:\program files\Common Files\Java
2010-09-13 01:54 . 2008-02-21 01:59 -------- d-----w- c:\program files\Java
2010-09-12 18:07 . 2009-11-29 03:36 -------- d-----w- c:\program files\Microsoft Silverlight
2010-09-12 17:48 . 2008-06-19 04:07 113933 ----a-w- c:\windows\system32\drivers\klin.dat
2010-09-12 17:48 . 2008-06-19 04:07 97549 ----a-w- c:\windows\system32\drivers\klick.dat
2008-06-19 02:50 . 2008-06-19 02:50 14 --sh--r- c:\windows\System32\drivers\fbd.sys
2008-06-19 02:50 . 2008-06-19 02:50 5 --sh--r- c:\windows\System32\drivers\taishop.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe" [2006-09-11 218032]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-09-10 2424560]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HWSetup"="\HWSetup.exe hwSetUP" [X]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2006-09-11 180224]
"TPwrMain"="c:\program files\TOSHIBA\Power Saver\TPwrMain.EXE" [2008-01-17 431456]
"SmoothView"="c:\program files\Toshiba\SmoothView\SmoothView.exe" [2007-06-16 448080]
"00TCrdMain"="c:\program files\TOSHIBA\FlashCards\TCrdMain.exe" [2008-01-22 712704]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-21 1008184]
"ITSecMng"="c:\program files\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2007-09-29 75136]
"NDSTray.exe"="NDSTray.exe" [BU]
"SVPWUTIL"="c:\program files\TOSHIBA\Utilities\SVPWUTIL.exe" [2006-03-23 438272]
"KeNotify"="c:\program files\TOSHIBA\Utilities\KeNotify.exe" [2006-11-07 34352]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2010-01-13 37888]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe" [2009-07-21 208616]
"nmctxth"="c:\program files\Common Files\Pure Networks Shared\Platform\nmctxth.exe" [2008-01-08 451896]
"lxdumon.exe"="c:\program files\Lexmark 5600-6600 Series\lxdumon.exe" [2008-09-10 676520]
"EzPrint"="c:\program files\Lexmark 5600-6600 Series\ezprint.exe" [2008-09-10 131752]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-03-20 1451304]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888]

c:\users\Arianna\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Linksys EasyLink Advisor.lnk - c:\program files\Linksys\Linksys EasyLink Advisor\Linksys EasyLink Advisor.exe [2008-3-7 110592]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\KASPER~1\KASPER~1\mzvkbd3.dll c:\progra~1\KASPER~1\KASPER~1\adialhk.dll c:\progra~1\KASPER~1\KASPER~1\kloehk.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2009-12-19 135664]
R2 LinksysUpdater;Linksys Updater;c:\program files\Linksys\Linksys Updater\bin\LinksysUpdater.exe [2008-02-18 204800]
R3 FlyUsb;FLY Fusion;c:\windows\system32\DRIVERS\FlyUsb.sys [2008-11-25 19456]
R3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\Jumpstart\jswpsapi.exe [2007-10-30 937984]
R3 PTDUBus;PANTECH UM175 Composite Device Driver ;c:\windows\system32\DRIVERS\PTDUBus.sys [2008-08-11 33024]
R3 PTDUMdm;PANTECH UM175 Drivers;c:\windows\system32\DRIVERS\PTDUMdm.sys [2008-08-11 41344]
R3 PTDUVsp;PANTECH UM175 Diagnostic Port;c:\windows\system32\DRIVERS\PTDUVsp.sys [2008-08-11 39936]
R3 PTDUWWAN;PANTECH UM175 WWAN Driver;c:\windows\system32\DRIVERS\PTDUWWAN.sys [2008-08-11 59904]
R3 SNL320XP;SONIX MULTIMEDIA USB DEVICE DRIVER;c:\windows\system32\DRIVERS\9kdUSBXP.sys [2006-12-28 16000]
R3 TpChoice;Touch Pad Detection Filter driver;c:\windows\system32\DRIVERS\TpChoice.sys [x]
S0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [2009-06-09 33808]
S1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\DRIVERS\jswpslwf.sys [2007-09-01 20352]
S1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\DRIVERS\klim6.sys [2008-07-09 20496]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S2 ConfigFree Service;ConfigFree Service;c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe [2007-12-25 40960]
S2 lxdu_device;lxdu_device;c:\windows\system32\lxducoms.exe [2009-10-16 589824]
S2 lxduCATSCustConnectService;lxduCATSCustConnectService;c:\windows\system32\spool\DRIVERS\W32X86\3\\lxduserv.exe [2009-10-16 94208]
S2 TOSHIBA SMART Log Service;TOSHIBA SMART Log Service;c:\program files\TOSHIBA\SMARTLogService\TosIPCSrv.exe [2007-12-04 126976]
S3 KLFLTDEV;Kaspersky Lab KLFltDev;c:\windows\system32\DRIVERS\klfltdev.sys [2008-03-14 26640]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-09-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-19 06:24]

2010-09-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-19 06:24]
.
.
------- Supplementary Scan -------
.
uStart Page = https://login.yahoo.com/config/login_verify2?&.src=ym
uInternet Settings,ProxyOverride = *.local
IE: Add to Banner Ad Blocker - c:\program files\Kaspersky Lab\Kaspersky Internet Security 2009\ie_banner_deny.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
Trusted Zone: chase.com
Trusted Zone: chase.com\www
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-TOSCDSPD - TOSCDSPD.EXE
HKLM-Run-jswtrayutil - c:\program files\Jumpstart\jswtrayutil.exe
AddRemove-WT028610 - c:\program files\TOSHIBA Games\Polar Bowler\Uninstall.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-28 21:34
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-09-28 21:41:55
ComboFix-quarantined-files.txt 2010-09-29 02:41

Pre-Run: 86,928,601,088 bytes free
Post-Run: 88,150,069,248 bytes free

Current=1 Default=1 Failed=0 LastKnownGood=67 Sets=1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67
- - End Of File - - 7E15F6405F9159D0B33D9849D7951F5D


#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 29 September 2010 - 01:38 PM

I would like you to check this driver file out.


Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Go to Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.

c:\windows\System32\drivers\taishop.sys

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at VirusTotal
Posted Image
m0le is a proud member of UNITE

#10 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 29 September 2010 - 10:58 PM





Jotti's malware scan
Filename: taishop.sys
Status: Scan finished. 0 out of 19 scanners reported malware.
Scan taken on: Thu 30 Sep 2010 05:34:38 (CET) Permalink



--------------------------------------------------------------------------------
Additional info
File size: 5 bytes
Filetype: ASCII text, with no line terminators
MD5: 1a2363051595604209e9824f5cdc0e71
SHA1: 515a4e1facfc48a1e008b0f3fcbe31e4ed19d0ed







Scanners
2010-09-30 Found nothing 2010-09-30 Found nothing
2010-09-29 Found nothing 2010-09-30 Found nothing
2010-09-29 Found nothing 2010-09-30 Found nothing
2010-09-29 Found nothing 2010-09-29 Found nothing
2010-09-30 Found nothing 2010-09-29 Found nothing
2010-09-30 Found nothing 2010-09-29 Found nothing
2010-09-30 Found nothing 2010-09-30 Found nothing
2010-09-29 Found nothing 2010-09-29 Found nothing
2010-09-29 Found nothing 2010-09-29 Found nothing


And from VirusTotal:

Antivirus Version Last update Result
AhnLab-V3 2010.09.29.01 2010.09.29 -
AntiVir 7.10.12.84 2010.09.29 -
Antiy-AVL 2.0.3.7 2010.09.30 -
Authentium 5.2.0.5 2010.09.30 -
Avast 4.8.1351.0 2010.09.29 -
Avast5 5.0.594.0 2010.09.29 -
AVG 9.0.0.851 2010.09.30 -
BitDefender 7.2 2010.09.30 -
CAT-QuickHeal 11.00 2010.09.30 -
ClamAV 0.96.2.0-git 2010.09.30 -
Comodo 6241 2010.09.29 -
DrWeb 5.0.2.03300 2010.09.30 -
Emsisoft 5.0.0.50 2010.09.30 -
eSafe 7.0.17.0 2010.09.28 -
eTrust-Vet 36.1.7884 2010.09.29 -
F-Prot 4.6.2.117 2010.09.30 -
F-Secure 9.0.15370.0 2010.09.30 -
Fortinet 4.1.143.0 2010.09.29 -
GData 21 2010.09.30 -
Ikarus T3.1.1.90.0 2010.09.30 -
Jiangmin 13.0.900 2010.09.29 -
K7AntiVirus 9.63.2628 2010.09.28 -
Kaspersky 7.0.0.125 2010.09.30 -
McAfee 5.400.0.1158 2010.09.30 -
McAfee-GW-Edition 2010.1C 2010.09.29 -
Microsoft 1.6201 2010.09.30 -
NOD32 5490 2010.09.29 -
Norman 6.06.07 2010.09.29 -
nProtect 2010-09-29.01 2010.09.29 -
Panda 10.0.2.7 2010.09.29 -
PCTools 7.0.3.5 2010.09.28 -
Prevx 3.0 2010.09.30 -
Rising 22.67.01.03 2010.09.29 -
Sophos 4.58.0 2010.09.30 -
Sunbelt 6947 2010.09.30 -
SUPERAntiSpyware 4.40.0.1006 2010.09.30 -
Symantec 20101.2.0.161 2010.09.29 -
TheHacker 6.7.0.1.040 2010.09.29 -
TrendMicro 9.120.0.1004 2010.09.30 -
TrendMicro-HouseCall 9.120.0.1004 2010.09.30 -
VBA32 3.12.14.1 2010.09.27 -
ViRobot 2010.8.31.4017 2010.09.30 -
VirusBuster 12.66.6.0 2010.09.29 -
MD5: 1a2363051595604209e9824f5cdc0e71
SHA1: 515a4e1facfc48a1e008b0f3fcbe31e4ed19d0ed
SHA256: a2153584f264d7753b58538decb338818ff6c4769b00447505ad2703f2851ef5
File size: 5 bytes
Scan date: 2010-09-30 03:36:35 (UTC)


--------------------------------------------------------------------------------


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 30 September 2010 - 06:02 PM

That file is clean. I have no idea what taishop.sys is though.

There's no sign of the trojan though. Do you have other removable drives? - if so please plug them into the PC when rerunning Combofix, as shown below

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
RegLock::
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.



Posted Image
m0le is a proud member of UNITE

#12 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 01 October 2010 - 10:18 PM

Again, this report indicates that Windows Defender is enabled. I double-checked to make sure it was turned off.

Is the entry regarding spoolsv.exe referring to the printer?

I don't know if this was supposed to occur, but what looks like ghosts popped up on my desktop after I first ran Comfix. They are files that cannot be opened.

New Comfix log:


ComboFix 10-10-01.01 - Arianna 10/01/2010 21:22:04.2.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.908 [GMT -5:00]
Running from: c:\users\Arianna\Desktop\comfix.exe
Command switches used :: c:\users\Arianna\Desktop\CFScript.txt
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\xp

.
((((((((((((((((((((((((( Files Created from 2010-09-02 to 2010-10-02 )))))))))))))))))))))))))))))))
.

2010-10-02 02:33 . 2010-10-02 02:33 -------- d-----w- c:\users\ReleaseEngineer.MACROVISION\AppData\Local\temp
2010-10-02 02:33 . 2010-10-02 02:33 -------- d-----w- c:\users\rage\AppData\Local\temp
2010-10-02 02:33 . 2010-10-02 02:33 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-10-02 02:33 . 2010-10-02 02:33 -------- d-----w- c:\users\Patrick\AppData\Local\temp
2010-10-02 02:33 . 2010-10-02 02:33 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-10-02 02:33 . 2010-10-02 02:33 -------- d-----w- c:\users\Arianna\AppData\Local\temp
2010-10-02 02:17 . 2010-10-02 02:18 -------- d-----w- C:\32788R22FWJFW
2010-09-30 22:36 . 2010-06-22 13:30 2048 ----a-w- c:\windows\system32\tzres.dll
2010-09-28 10:35 . 2010-09-28 10:35 63488 ----a-w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-09-28 10:35 . 2010-09-28 10:35 52224 ----a-w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-09-28 10:35 . 2010-09-28 10:35 117760 ----a-w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-09-28 10:35 . 2010-09-28 10:35 -------- d-----w- c:\users\Arianna\AppData\Roaming\SUPERAntiSpyware.com
2010-09-28 10:34 . 2010-09-30 22:33 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-09-28 04:53 . 2010-09-28 04:53 -------- d-----w- c:\users\Arianna\AppData\Roaming\Malwarebytes
2010-09-28 04:52 . 2010-04-29 20:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-28 04:52 . 2010-09-28 04:53 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-09-28 04:52 . 2010-04-29 20:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-09-17 22:04 . 2010-09-17 22:04 -------- d-----w- c:\program files\QuickTime
2010-09-17 03:44 . 2010-04-16 16:46 502272 ----a-w- c:\windows\system32\usp10.dll
2010-09-17 03:44 . 2010-08-17 14:11 128000 ----a-w- c:\windows\system32\spoolsv.exe
2010-09-17 03:44 . 2010-04-05 17:02 317952 ----a-w- c:\windows\system32\MP4SDECD.DLL
2010-09-17 03:44 . 2010-05-27 20:08 739328 ----a-w- c:\windows\system32\inetcomm.dll
2010-09-12 18:28 . 2009-11-08 15:55 99176 ----a-w- c:\windows\system32\PresentationHostProxy.dll
2010-09-12 18:28 . 2009-11-08 15:55 49472 ----a-w- c:\windows\system32\netfxperf.dll
2010-09-12 18:28 . 2009-11-08 15:55 297808 ----a-w- c:\windows\system32\mscoree.dll
2010-09-12 18:28 . 2009-11-08 15:55 295264 ----a-w- c:\windows\system32\PresentationHost.exe
2010-09-12 18:28 . 2009-11-08 15:55 1130824 ----a-w- c:\windows\system32\dfshim.dll
2010-09-12 17:45 . 2010-03-05 14:01 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-09-12 17:41 . 2010-07-17 10:00 423656 ----a-w- c:\windows\system32\deployJava1.dll
2010-09-12 17:41 . 2010-05-27 20:08 81920 ----a-w- c:\windows\system32\iccvid.dll
2010-09-12 17:39 . 2010-06-11 16:16 274944 ----a-w- c:\windows\system32\schannel.dll
2010-09-12 17:39 . 2010-04-05 17:01 67072 ----a-w- c:\windows\system32\asycfilt.dll
2010-09-12 17:38 . 2010-04-16 16:43 28672 ----a-w- c:\windows\system32\Apphlpdm.dll
2010-09-12 17:38 . 2010-04-16 14:39 4240384 ----a-w- c:\windows\system32\GameUXLegacyGDFs.dll
2010-09-12 17:36 . 2010-05-26 14:47 289792 ----a-w- c:\windows\system32\atmfd.dll
2010-09-12 17:35 . 2010-05-26 17:06 34304 ----a-w- c:\windows\system32\atmlib.dll
2010-09-12 17:35 . 2010-06-21 13:37 2037760 ----a-w- c:\windows\system32\win32k.sys
2010-09-12 17:35 . 2010-06-18 17:31 36864 ----a-w- c:\windows\system32\rtutils.dll
2010-09-12 17:34 . 2010-06-08 17:35 3548040 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-09-12 17:34 . 2010-06-08 17:35 3600768 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-09-12 17:34 . 2010-06-11 16:15 1248768 ----a-w- c:\windows\system32\msxml3.dll
2010-09-12 17:34 . 2010-06-18 15:04 302080 ----a-w- c:\windows\system32\drivers\srv.sys
2010-09-12 17:34 . 2010-06-18 15:04 144896 ----a-w- c:\windows\system32\drivers\srv2.sys
2010-09-12 17:34 . 2010-06-16 16:04 905088 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-09-12 17:19 . 2009-12-23 11:33 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-09-12 17:17 . 2010-01-13 17:34 98304 ----a-w- c:\windows\system32\cabview.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-10-02 02:17 . 2009-06-09 02:53 5840 --sha-w- c:\windows\system32\drivers\fidbox2.idx
2010-10-02 01:21 . 2009-11-29 03:36 -------- d-----w- c:\program files\Microsoft Silverlight
2010-09-30 04:10 . 2009-06-09 02:53 1392672 --sha-w- c:\windows\system32\drivers\fidbox2.dat
2010-09-30 04:10 . 2008-06-19 04:06 680504 --sha-w- c:\windows\system32\drivers\fidbox.idx
2010-09-30 04:10 . 2008-06-19 04:06 50745888 --sha-w- c:\windows\system32\drivers\fidbox.dat
2010-09-22 20:48 . 2008-09-10 00:01 1356 ----a-w- c:\users\Arianna\AppData\Local\d3d9caps.dat
2010-09-17 04:07 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-09-13 01:56 . 2008-02-21 01:59 -------- d-----w- c:\program files\Common Files\Java
2010-09-13 01:54 . 2008-02-21 01:59 -------- d-----w- c:\program files\Java
2010-09-12 17:48 . 2008-06-19 04:07 113933 ----a-w- c:\windows\system32\drivers\klin.dat
2010-09-12 17:48 . 2008-06-19 04:07 97549 ----a-w- c:\windows\system32\drivers\klick.dat
2008-06-19 02:50 . 2008-06-19 02:50 14 --sh--r- c:\windows\System32\drivers\fbd.sys
2008-06-19 02:50 . 2008-06-19 02:50 5 --sh--r- c:\windows\System32\drivers\taishop.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe" [2006-09-11 218032]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-09-10 2424560]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HWSetup"="\HWSetup.exe hwSetUP" [X]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2006-09-11 180224]
"TPwrMain"="c:\program files\TOSHIBA\Power Saver\TPwrMain.EXE" [2008-01-17 431456]
"SmoothView"="c:\program files\Toshiba\SmoothView\SmoothView.exe" [2007-06-16 448080]
"00TCrdMain"="c:\program files\TOSHIBA\FlashCards\TCrdMain.exe" [2008-01-22 712704]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-21 1008184]
"ITSecMng"="c:\program files\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2007-09-29 75136]
"NDSTray.exe"="NDSTray.exe" [BU]
"SVPWUTIL"="c:\program files\TOSHIBA\Utilities\SVPWUTIL.exe" [2006-03-23 438272]
"KeNotify"="c:\program files\TOSHIBA\Utilities\KeNotify.exe" [2006-11-07 34352]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2010-01-13 37888]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe" [2009-07-21 208616]
"nmctxth"="c:\program files\Common Files\Pure Networks Shared\Platform\nmctxth.exe" [2008-01-08 451896]
"lxdumon.exe"="c:\program files\Lexmark 5600-6600 Series\lxdumon.exe" [2008-09-10 676520]
"EzPrint"="c:\program files\Lexmark 5600-6600 Series\ezprint.exe" [2008-09-10 131752]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-03-20 1451304]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888]

c:\users\Arianna\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Linksys EasyLink Advisor.lnk - c:\program files\Linksys\Linksys EasyLink Advisor\Linksys EasyLink Advisor.exe [2008-3-7 110592]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\KASPER~1\KASPER~1\mzvkbd3.dll c:\progra~1\KASPER~1\KASPER~1\adialhk.dll c:\progra~1\KASPER~1\KASPER~1\kloehk.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2009-12-19 135664]
R2 LinksysUpdater;Linksys Updater;c:\program files\Linksys\Linksys Updater\bin\LinksysUpdater.exe [2008-02-18 204800]
R3 FlyUsb;FLY Fusion;c:\windows\system32\DRIVERS\FlyUsb.sys [2008-11-25 19456]
R3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\Jumpstart\jswpsapi.exe [2007-10-30 937984]
R3 PTDUBus;PANTECH UM175 Composite Device Driver ;c:\windows\system32\DRIVERS\PTDUBus.sys [2008-08-11 33024]
R3 PTDUMdm;PANTECH UM175 Drivers;c:\windows\system32\DRIVERS\PTDUMdm.sys [2008-08-11 41344]
R3 PTDUVsp;PANTECH UM175 Diagnostic Port;c:\windows\system32\DRIVERS\PTDUVsp.sys [2008-08-11 39936]
R3 PTDUWWAN;PANTECH UM175 WWAN Driver;c:\windows\system32\DRIVERS\PTDUWWAN.sys [2008-08-11 59904]
R3 SNL320XP;SONIX MULTIMEDIA USB DEVICE DRIVER;c:\windows\system32\DRIVERS\9kdUSBXP.sys [2006-12-28 16000]
R3 TpChoice;Touch Pad Detection Filter driver;c:\windows\system32\DRIVERS\TpChoice.sys [x]
S0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [2009-06-09 33808]
S1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\DRIVERS\jswpslwf.sys [2007-09-01 20352]
S1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\DRIVERS\klim6.sys [2008-07-09 20496]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S2 ConfigFree Service;ConfigFree Service;c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe [2007-12-25 40960]
S2 lxdu_device;lxdu_device;c:\windows\system32\lxducoms.exe [2009-10-16 589824]
S2 lxduCATSCustConnectService;lxduCATSCustConnectService;c:\windows\system32\spool\DRIVERS\W32X86\3\\lxduserv.exe [2009-10-16 94208]
S2 TOSHIBA SMART Log Service;TOSHIBA SMART Log Service;c:\program files\TOSHIBA\SMARTLogService\TosIPCSrv.exe [2007-12-04 126976]
S3 KLFLTDEV;Kaspersky Lab KLFltDev;c:\windows\system32\DRIVERS\klfltdev.sys [2008-03-14 26640]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-10-02 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-19 06:24]

2010-10-02 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-19 06:24]
.
.
------- Supplementary Scan -------
.
uStart Page = https://login.yahoo.com/config/login_verify2?&.src=ym
uInternet Settings,ProxyOverride = *.local
IE: Add to Banner Ad Blocker - c:\program files\Kaspersky Lab\Kaspersky Internet Security 2009\ie_banner_deny.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
Trusted Zone: chase.com
Trusted Zone: chase.com\www
.

**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-10-01 21:38:15
ComboFix-quarantined-files.txt 2010-10-02 02:38
ComboFix2.txt 2010-09-29 02:41

Pre-Run: 87,474,352,128 bytes free
Post-Run: 87,288,561,664 bytes free

Current=1 Default=1 Failed=0 LastKnownGood=1 Sets=1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69
- - End Of File - - 40EB0BD0F13513546EEA7E586321C941


#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 02 October 2010 - 06:18 AM

Yes, in this case spoolsv.exe is a printer file. It is part of the spooler subsystem responsible for managing spooled print and fax jobs

So far, there's nothing to worry about. Please scan next with ESET
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.

Posted Image
m0le is a proud member of UNITE

#14 FunFilter

FunFilter
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:A place of ignorance
  • Local time:04:02 PM

Posted 03 October 2010 - 01:21 AM

None.

I can't say I am unhappy... just mystified.

Arianna

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 03 October 2010 - 04:10 AM

CD ROM trojans are few and far between and very easy to remove as you just need to stop them at startup. It may be that something else you're running did this without your knowledge.

If you have no further symptoms then I will go ahead with the final instructions and then I will keep this open for five days. Any problems in that time just post here. PM me after that time. I think you're clean though. thumbup2.gif
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users