Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible Rookits Malware and Trojans!!


  • This topic is locked This topic is locked
16 replies to this topic

#1 patrick.waite01

patrick.waite01

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 31 January 2011 - 03:05 AM

DDS (Ver_10-12-12.02) - NTFSx86
Run by Phillip Waite at 0:37:49.90 on Mon 01/31/2011
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1535.657 [GMT -7:00]

AV: Norton Internet Security *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
AV: McAfee VirusScan Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
FW: Norton Internet Security *Disabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\MacOpener\FORMATM.EXE
C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\WINDOWS\system32\mfevtps.exe
C:\Program Files\Nikon\Wireless Camera Setup Utility\NkPtpEnum.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Common Files\supportsoft\bin\sprtlisten.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\Mixer.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\hphmon06.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ .exe
C:\Program Files\HP\digital imaging\bin\hpqtra08.exe
C:\Program Files\MacOpener\MacName.exe
C:\Program Files\Common Files\Symantec Shared\ccApp .exe
C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
C:\Program Files\MSI\PC Alert 4\PCAlert4.exe
C:\Program Files\MSN Toolbar Suite\DS\02.05.0001.1119\en-us\bin\WindowsSearch.exe
C:\Program Files\MSI\Live Update 3\LMonitor .exe
C:\Program Files\McAfee\Common Framework\udaterui .exe
C:\WINDOWS\system32\bcmwltry .exe
C:\Program Files\iTunes\iTunesHelper .exe
C:\Program Files\HP\HP Software Update\HPWuSchd2 .exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\MSN Toolbar Suite\DS\02.05.0001.1119\en-us\bin\WindowsSearchIndexer.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\MSN Toolbar\Platform\6.3.2383.0\mswinext.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SCServer\SCServer.exe
C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\DOCUME~1\PHILLI~1\LOCALS~1\Temp\hki90414.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\All Users\Application Data\L6M188l2.exe
C:\Documents and Settings\All Users\Application Data\L6M188l2.exe
C:\WINDOWS\system32\RunDll32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\RunDll32.exe
C:\Documents and Settings\Phillip Waite\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://qwest.live.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = <local>;*.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\adobe acrobat 7.0\activex\AcroIEHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Skype Plug-In: {ae805869-2e5c-4ed4-8f7b-f1f7851a4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.6.5805.1910\swg.dll
BHO: MSN Search Toolbar Helper: {bdbd1dad-c946-4a17-adc1-64b5b4ff55d0} - c:\program files\msn toolbar suite\tb\02.05.0001.1119\en-us\msntb.dll
BHO: Bing Bar BHO: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn toolbar\platform\6.3.2383.0\npwinext.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: MSN Search Toolbar: {bdad1dad-c946-4a17-adc1-64b5b4ff55d0} - c:\program files\msn toolbar suite\tb\02.05.0001.1119\en-us\msntb.dll
TB: @c:\program files\msn toolbar\platform\6.3.2383.0\npwinext.dll,-100: {8dcb7100-df86-4384-8842-8fa844297b3f} - c:\program files\msn toolbar\platform\6.3.2383.0\npwinext.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: {47833539-D0C5-4125-9FA8-0819E2EAAC93} - No File
TB: {21FA44EF-376D-4D53-9B0F-8A89D3229068} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [Google Update] "c:\documents and settings\phillip waite\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [C-Media Mixer] Mixer.exe /startup
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [Symantec NetDriver Monitor] c:\progra~1\symnet~1\SNDMon.exe /Consumer
mRun: [LWBMOUSE] c:\program files\belkin mouse 1.0\MOUSE32A.EXE
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [HPDJ Taskbar Utility] c:\windows\system32\spool\drivers\w32x86\3\hpztsb11.exe
mRun: [HPHUPD06] c:\program files\hp\{aac4fc36-8f89-4587-8dd3-ebc57c83374d}\hphupd06.exe
mRun: [HP Component Manager] "c:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [HPHmon06] c:\windows\system32\hphmon06.exe
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
mRun: [LiveMonitor] c:\program files\msi\live update 3\LMonitor.exe
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\udaterui.exe" /StartedFromRunKey
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [bcmwltry] bcmwltry.exe
mRun: [removecpl] RemoveCpl.exe
mRun: [Microsoft Default Manager] "c:\program files\microsoft\search enhancement pack\default manager\DefMgr.exe" -resume
mRun: [QuickTime Task] "c:\program files\quicktime\qttask .exe" -atboottime
StartupFolder: c:\documents and settings\phillip waite\start menu\programs\startup\PowerReg Scheduler V3.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\macname.lnk - c:\program files\macopener\MacName.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\nkbmon~1.lnk - c:\program files\nikon\pictureproject\NkbMonitor.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\pcaler~1.lnk - c:\program files\msi\pc alert 4\PCAlert4.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\secure~1.lnk - c:\program files\msi\securedoc\Logon.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - c:\program files\msn toolbar suite\ds\02.05.0001.1119\en-us\bin\WindowsSearch.exe
IE: &MSN Search - c:\program files\msn toolbar suite\tb\02.05.0001.1119\en-us\msntb.dll/search.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
IE: Open in new background tab - c:\program files\msn toolbar suite\tab\02.05.0001.1119\en-us\msntabres.dll/229?7349b96d3b674236bb99b277f2898365
IE: Open in new foreground tab - c:\program files\msn toolbar suite\tab\02.05.0001.1119\en-us\msntabres.dll/230?7349b96d3b674236bb99b277f2898365
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Trusted Zone: yahoo.com\music
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=48835
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} - hxxp://www.costcophotocenter.com/CostcoActivia.cab
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://gfx1.mail.live.com/mail/w1/resources/MSNPUpld.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1140154235734
DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} - hxxp://12.10.133.20/tsweb/msrdp.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_10-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {D6E7CFB5-C074-4D1C-B647-663D1A8D96BF} - hxxp://upload.facebook.com/controls/FacebookPhotoUploader4_5.cab
DPF: {E473A65C-8087-49A3-AFFD-C5BC4A10669B} - hxxp://xlonhcld.xlontech.net/100348/qmpbeta/qsp2ie06011811.cab
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R0 MacOpen;MacOpen;c:\windows\system32\drivers\MacOpen.sys [2006-2-25 180316]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-4-11 340592]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\CCEVTMGR.EXE [2004-8-27 198304]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\CCSETMGR.EXE [2004-8-27 181920]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-4-11 90360]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-4-11 42424]
R3 PCAlertDriver;PCAlertDriver;c:\program files\msi\pc alert 4\NTGLM7X.SYS [2006-2-21 21760]
R3 VBus;Virtual Bus;c:\windows\system32\drivers\NkVBus.sys [2005-6-17 17664]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 gupdate1ca0adbc6673a90;Google Update Service (gupdate1ca0adbc6673a90);c:\program files\google\update\GoogleUpdate.exe [2009-7-22 133104]
S2 IcRecUsb;IC Recorder Driver;c:\windows\system32\drivers\IcRecUsb.sys [2006-7-4 17432]
S3 ccPwdSvc;Symantec Password Validation;c:\program files\common files\symantec shared\CCPWDSVC.EXE [2004-8-27 79520]
S3 dwfdpnttsh;dwfdpnttsh;\??\c:\program files\pat's\my mods\dwfdpnttsh.sys --> c:\program files\pat's\my mods\dwfdpnttsh.sys [?]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2009-4-11 64432]
S3 nv3;nv3;c:\windows\system32\drivers\nv3.sys [2006-2-20 198144]

=============== Created Last 30 ================

2011-01-29 21:13:02 79362 ----a-w- c:\docume~1\alluse~1\applic~1\L6M188l2.exe
2011-01-20 06:16:28 7552 -c--a-w- c:\windows\system32\dllcache\sonypvu1.sys
2011-01-20 06:16:28 7552 ----a-w- c:\windows\system32\drivers\SONYPVU1.SYS
2011-01-14 18:15:18 -------- d-----r- c:\program files\Skype
2011-01-13 17:48:37 -------- d-sha-r- C:\cmdcons
2011-01-13 17:45:15 98816 ----a-w- c:\windows\sed.exe
2011-01-13 17:45:15 89088 ----a-w- c:\windows\MBR.exe
2011-01-13 17:45:15 256512 ----a-w- c:\windows\PEV.exe
2011-01-13 17:45:15 161792 ----a-w- c:\windows\SWREG.exe
2011-01-13 17:45:07 -------- d-----w- C:\ComboFix
2011-01-12 18:41:55 -------- d-----w- C:\22ed6d5d62f3487ab82e6e
2011-01-11 19:11:27 21840 ----atw- c:\windows\system32\SIntfNT.dll
2011-01-11 19:11:27 17212 ----atw- c:\windows\system32\SIntf32.dll
2011-01-11 19:11:27 12067 ----atw- c:\windows\system32\SIntf16.dll
2011-01-11 06:05:53 -------- d-----w- c:\program files\Infogrames Interactive
2011-01-11 05:54:23 94208 ----a-w- c:\windows\DIIUnin.exe
2011-01-11 05:54:23 2829 ----a-w- c:\windows\DIIUnin.pif
2011-01-11 05:50:19 -------- d-----w- c:\program files\Diablo II
2011-01-08 17:41:12 -------- d-----w- C:\iPod Photo Cache

==================== Find3M ====================

2010-12-31 09:05:13 37380 ----a-w- c:\windows\system32\bcmwltry.exe
2010-11-30 00:38:30 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2010-11-30 00:38:30 69632 ----a-w- c:\windows\system32\QuickTime.qts
2010-11-18 18:12:44 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-13 01:53:06 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-11-12 23:34:10 73728 ----a-w- c:\windows\system32\javacpl.cpl
2010-11-09 14:52:35 249856 ----a-w- c:\windows\system32\odbc32.dll
2010-11-06 00:26:58 916480 ----a-w- c:\windows\system32\wininet.dll
2010-11-06 00:26:58 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-11-06 00:26:58 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2010-11-03 12:25:54 385024 ------w- c:\windows\system32\html.iec
2008-10-11 16:53:01 262144 ----a-w- c:\program files\Uninstall Ask Toolbar.dll
2007-09-09 19:42:28 563200 ------w- c:\program files\raswin.exe

============= FINISH: 0:43:34.42 ===============

......................................................................................................................

I couldn't get the GMER Log because my computer would close the program automatically. And no matter how many times i tried it would close it at different times. I never had the chance to preform the scan even. Sorry about that...

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 04 February 2011 - 09:37 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#3 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 05 February 2011 - 03:20 AM

Hey, thank you so much for the help! As a professional, what is my next move?

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 05 February 2011 - 04:15 AM

Let's check for a specific rootkit here.

  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l report.txt

  • Now click Start Scan.
  • If Malicious objects are found, ensure Cure is selected then click Continue > Reboot now.
  • Click Close
  • Finally press Report and copy and paste the contents into your next reply. If you've rebooted then the log will be found at C:\

Posted Image
m0le is a proud member of UNITE

#5 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 05 February 2011 - 12:28 PM

2011/02/05 10:25:35.0640 2092 TDSS rootkit removing tool 2.4.16.0 Feb 1 2011 10:34:03
2011/02/05 10:25:36.0031 2092 ================================================================================
2011/02/05 10:25:36.0046 2092 SystemInfo:
2011/02/05 10:25:36.0046 2092
2011/02/05 10:25:36.0046 2092 OS Version: 5.1.2600 ServicePack: 3.0
2011/02/05 10:25:36.0046 2092 Product type: Workstation
2011/02/05 10:25:36.0046 2092 ComputerName: BADGUYCOMPUTER
2011/02/05 10:25:36.0046 2092 UserName: Phillip Waite
2011/02/05 10:25:36.0046 2092 Windows directory: C:\WINDOWS
2011/02/05 10:25:36.0046 2092 System windows directory: C:\WINDOWS
2011/02/05 10:25:36.0046 2092 Processor architecture: Intel x86
2011/02/05 10:25:36.0046 2092 Number of processors: 1
2011/02/05 10:25:36.0046 2092 Page size: 0x1000
2011/02/05 10:25:36.0046 2092 Boot type: Normal boot
2011/02/05 10:25:36.0046 2092 ================================================================================
2011/02/05 10:25:36.0250 2092 Initialize success
2011/02/05 10:25:57.0218 2768 ================================================================================
2011/02/05 10:25:57.0218 2768 Scan started
2011/02/05 10:25:57.0218 2768 Mode: Manual;
2011/02/05 10:25:57.0218 2768 ================================================================================
2011/02/05 10:25:58.0031 2768 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/02/05 10:25:58.0140 2768 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/02/05 10:25:58.0343 2768 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/02/05 10:25:58.0453 2768 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2011/02/05 10:25:59.0031 2768 Aspi32 (54ab078660e536da72b21a27f56b035b) C:\WINDOWS\system32\drivers\aspi32.sys
2011/02/05 10:25:59.0171 2768 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/02/05 10:25:59.0250 2768 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/02/05 10:25:59.0484 2768 ati2mtaa (075e091eebb450eedae9da74f5b46494) C:\WINDOWS\system32\DRIVERS\ati2mtaa.sys
2011/02/05 10:25:59.0609 2768 ati2mtag (8759322ffc1a50569c1e5528ee8026b7) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
2011/02/05 10:25:59.0937 2768 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/02/05 10:26:00.0187 2768 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/02/05 10:26:00.0531 2768 BCM43XX (ebf36d658d0da5b1ea667fa403919c26) C:\WINDOWS\system32\DRIVERS\bcmwl5.sys
2011/02/05 10:26:00.0828 2768 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/02/05 10:26:01.0328 2768 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/02/05 10:26:01.0562 2768 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/02/05 10:26:02.0187 2768 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/02/05 10:26:02.0406 2768 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/02/05 10:26:02.0671 2768 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/02/05 10:26:03.0203 2768 cmpci (e5842ccf0953d3d46d5e26427b67e901) C:\WINDOWS\system32\drivers\cmaudio.sys
2011/02/05 10:26:03.0968 2768 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/02/05 10:26:04.0406 2768 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/02/05 10:26:04.0609 2768 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/02/05 10:26:04.0828 2768 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/02/05 10:26:05.0125 2768 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/02/05 10:26:05.0671 2768 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/02/05 10:26:06.0421 2768 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/02/05 10:26:06.0703 2768 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2011/02/05 10:26:06.0953 2768 FETND5BV (81e0f475a94360c2cf60f3d74d206875) C:\WINDOWS\system32\DRIVERS\fetnd5bv.sys
2011/02/05 10:26:07.0328 2768 FETNDIS (e9648254056bce81a85380c0c3647dc4) C:\WINDOWS\system32\DRIVERS\fetnd5.sys
2011/02/05 10:26:07.0546 2768 FETNDISB (a583bc166495b07f704533754ce29cbd) C:\WINDOWS\system32\DRIVERS\fetnd5b.sys
2011/02/05 10:26:07.0734 2768 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/02/05 10:26:07.0843 2768 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2011/02/05 10:26:07.0953 2768 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/02/05 10:26:08.0031 2768 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/02/05 10:26:08.0156 2768 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/02/05 10:26:08.0312 2768 gameenum (065639773d8b03f33577f6cdaea21063) C:\WINDOWS\system32\DRIVERS\gameenum.sys
2011/02/05 10:26:08.0625 2768 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\Drivers\GEARAspiWDM.sys
2011/02/05 10:26:09.0593 2768 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/02/05 10:26:11.0171 2768 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/02/05 10:26:11.0500 2768 HPZid412 (30ca91e657cede2f95359d6ef186f650) C:\WINDOWS\system32\DRIVERS\HPZid412.sys
2011/02/05 10:26:11.0656 2768 HPZipr12 (efd31afa752aa7c7bbb57bcbe2b01c78) C:\WINDOWS\system32\DRIVERS\HPZipr12.sys
2011/02/05 10:26:12.0296 2768 HPZius12 (abcb05ccdbf03000354b9553820e39f8) C:\WINDOWS\system32\DRIVERS\HPZius12.sys
2011/02/05 10:26:12.0937 2768 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/02/05 10:26:14.0015 2768 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/02/05 10:26:14.0125 2768 IcRecUsb (16e441dc4daf703fb0b0fe474830ff53) C:\WINDOWS\system32\Drivers\IcRecUsb.sys
2011/02/05 10:26:14.0437 2768 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/02/05 10:26:14.0656 2768 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2011/02/05 10:26:14.0703 2768 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/02/05 10:26:14.0781 2768 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/02/05 10:26:14.0875 2768 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/02/05 10:26:14.0937 2768 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/02/05 10:26:15.0046 2768 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/02/05 10:26:15.0140 2768 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/02/05 10:26:15.0687 2768 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/02/05 10:26:16.0281 2768 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/02/05 10:26:16.0734 2768 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/02/05 10:26:17.0265 2768 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/02/05 10:26:17.0687 2768 MacOpen (a077f2329762dfb89bd2da2ea9c9aa5a) C:\WINDOWS\system32\drivers\MacOpen.sys
2011/02/05 10:26:18.0296 2768 mfeapfk (d0813cf480e3d38a265f3be86522bf3b) C:\WINDOWS\system32\drivers\mfeapfk.sys
2011/02/05 10:26:18.0734 2768 mfeavfk (04440cc0f5f89933babd585cc5f2f70e) C:\WINDOWS\system32\drivers\mfeavfk.sys
2011/02/05 10:26:19.0343 2768 mfebopk (f6e257c31e0c354a2ed22bf5026c2466) C:\WINDOWS\system32\drivers\mfebopk.sys
2011/02/05 10:26:19.0828 2768 mfehidk (79fae8ce9a478f79b74873a810c8227e) C:\WINDOWS\system32\drivers\mfehidk.sys
2011/02/05 10:26:20.0250 2768 mferkdet (f21bf10a3784e52eec925bb5f7d3fffa) C:\WINDOWS\system32\drivers\mferkdet.sys
2011/02/05 10:26:20.0343 2768 mfetdik (f2d4d0f8e230257a0be36df803b549d1) C:\WINDOWS\system32\drivers\mfetdik.sys
2011/02/05 10:26:20.0515 2768 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/02/05 10:26:20.0843 2768 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/02/05 10:26:21.0500 2768 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/02/05 10:26:22.0140 2768 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/02/05 10:26:22.0812 2768 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/02/05 10:26:23.0359 2768 mr7910 (6aa46f9896d3c9e5a00e01bb416c707b) C:\WINDOWS\system32\DRIVERS\mr7910.sys
2011/02/05 10:26:23.0687 2768 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/02/05 10:26:23.0890 2768 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/02/05 10:26:24.0046 2768 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/02/05 10:26:24.0171 2768 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/02/05 10:26:24.0640 2768 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/02/05 10:26:25.0203 2768 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/02/05 10:26:25.0625 2768 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/02/05 10:26:26.0203 2768 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
2011/02/05 10:26:26.0609 2768 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2011/02/05 10:26:26.0718 2768 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/02/05 10:26:26.0843 2768 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/02/05 10:26:26.0953 2768 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/02/05 10:26:27.0078 2768 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/02/05 10:26:27.0140 2768 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/02/05 10:26:27.0250 2768 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/02/05 10:26:27.0390 2768 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/02/05 10:26:27.0437 2768 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/02/05 10:26:27.0515 2768 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/02/05 10:26:27.0687 2768 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/02/05 10:26:27.0765 2768 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/02/05 10:26:27.0890 2768 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/02/05 10:26:28.0093 2768 nv (be10db9ad60d5814aeff31d976b99448) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2011/02/05 10:26:31.0296 2768 nv3 (fd6d989ad4f14447bc634aa2eba4d169) C:\WINDOWS\system32\DRIVERS\nv3.sys
2011/02/05 10:26:33.0062 2768 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/02/05 10:26:33.0328 2768 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/02/05 10:26:33.0437 2768 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/02/05 10:26:33.0546 2768 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/02/05 10:26:33.0625 2768 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/02/05 10:26:33.0937 2768 PCAlertDriver (1983f0f144ebd6ee1248b3dbd2b8c9ce) C:\Program Files\MSI\PC Alert 4\NTGLM7X.sys
2011/02/05 10:26:34.0562 2768 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/02/05 10:26:34.0906 2768 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/02/05 10:26:35.0640 2768 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/02/05 10:26:35.0734 2768 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
2011/02/05 10:26:35.0859 2768 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/02/05 10:26:35.0953 2768 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/02/05 10:26:36.0046 2768 PxHelp20 (49452bfcec22f36a7a9b9c2181bc3042) C:\WINDOWS\system32\Drivers\PxHelp20.sys
2011/02/05 10:26:40.0656 2768 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/02/05 10:26:40.0890 2768 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/02/05 10:26:41.0000 2768 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/02/05 10:26:41.0093 2768 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/02/05 10:26:41.0203 2768 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/02/05 10:26:41.0281 2768 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/02/05 10:26:41.0437 2768 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/02/05 10:26:41.0578 2768 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/02/05 10:26:41.0687 2768 RimUsb (c48ed71f500f07a01aa8ac274e144e93) C:\WINDOWS\system32\Drivers\RimUsb.sys
2011/02/05 10:26:41.0984 2768 RimVSerPort (32d6ab810537ce38cbffe04ed9f6709a) C:\WINDOWS\system32\DRIVERS\RimSerial.sys
2011/02/05 10:26:42.0187 2768 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) C:\WINDOWS\system32\Drivers\RootMdm.sys
2011/02/05 10:26:42.0468 2768 S3Psddr (cd04f56f38867142672060ef23b43ed5) C:\WINDOWS\system32\DRIVERS\s3gnbm.sys
2011/02/05 10:26:42.0796 2768 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/02/05 10:26:42.0968 2768 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/02/05 10:26:43.0062 2768 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/02/05 10:26:43.0281 2768 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/02/05 10:26:43.0531 2768 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/02/05 10:26:43.0750 2768 SONYPVU1 (a1eceeaa5c5e74b2499eb51d38185b84) C:\WINDOWS\system32\DRIVERS\SONYPVU1.SYS
2011/02/05 10:26:44.0062 2768 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/02/05 10:26:45.0921 2768 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/02/05 10:26:46.0484 2768 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/02/05 10:26:48.0500 2768 StillCam (a9573045baa16eab9b1085205b82f1ed) C:\WINDOWS\system32\DRIVERS\serscan.sys
2011/02/05 10:26:49.0984 2768 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/02/05 10:26:51.0046 2768 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/02/05 10:26:51.0296 2768 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/02/05 10:26:51.0578 2768 SYMDNS (1f0a3f93fecba6e873e75ac34538708b) C:\WINDOWS\System32\Drivers\SYMDNS.SYS
2011/02/05 10:26:51.0765 2768 SymEvent (c9b8f325b2a22cda1bda7b25181b1389) C:\Program Files\Symantec\SYMEVENT.SYS
2011/02/05 10:26:51.0968 2768 SYMFW (ca212638c07f7a1736667319589f416e) C:\WINDOWS\System32\Drivers\SYMFW.SYS
2011/02/05 10:26:53.0671 2768 SYMIDS (83a0415ab669afe9f2b7fccc52f23153) C:\WINDOWS\System32\Drivers\SYMIDS.SYS
2011/02/05 10:26:54.0781 2768 SYMNDIS (2a8ebb694d702d91d8046b31c3da2220) C:\WINDOWS\System32\Drivers\SYMNDIS.SYS
2011/02/05 10:26:56.0375 2768 SYMREDRV (7c73b65f1bdfab9052a5076c0ca622de) C:\WINDOWS\System32\Drivers\SYMREDRV.SYS
2011/02/05 10:26:56.0828 2768 SYMTDI (b4562798891dca27ed67ca07acbadbd9) C:\WINDOWS\System32\Drivers\SYMTDI.SYS
2011/02/05 10:26:59.0281 2768 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/02/05 10:27:00.0906 2768 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/02/05 10:27:01.0609 2768 Tcpip6 (4e53bbcc4be37d7a4bd6ef1098c89ff7) C:\WINDOWS\system32\DRIVERS\tcpip6.sys
2011/02/05 10:27:01.0875 2768 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/02/05 10:27:01.0984 2768 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/02/05 10:27:02.0093 2768 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/02/05 10:27:02.0390 2768 tunmp (8f861eda21c05857eb8197300a92501c) C:\WINDOWS\system32\DRIVERS\tunmp.sys
2011/02/05 10:27:02.0500 2768 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/02/05 10:27:02.0671 2768 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/02/05 10:27:02.0875 2768 USBAAPL (5c2bdc152bbab34f36473deaf7713f22) C:\WINDOWS\system32\Drivers\usbaapl.sys
2011/02/05 10:27:03.0171 2768 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/02/05 10:27:03.0250 2768 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/02/05 10:27:03.0328 2768 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/02/05 10:27:03.0453 2768 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/02/05 10:27:03.0531 2768 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2011/02/05 10:27:03.0640 2768 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/02/05 10:27:03.0750 2768 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/02/05 10:27:03.0843 2768 VBus (2f819aa4b3171efc050b648430800dc2) C:\WINDOWS\system32\DRIVERS\NkVBus.sys
2011/02/05 10:27:04.0562 2768 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/02/05 10:27:06.0046 2768 viaagp (754292ce5848b3738281b4f3607eaef4) C:\WINDOWS\system32\DRIVERS\viaagp.sys
2011/02/05 10:27:06.0390 2768 viaagp1 (4b039bbd037b01f5db5a144c837f283a) C:\WINDOWS\system32\DRIVERS\viaagp1.sys
2011/02/05 10:27:06.0500 2768 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) C:\WINDOWS\system32\DRIVERS\viaide.sys
2011/02/05 10:27:06.0609 2768 VIAudio (a6fcca426660d3fc5a5cb7c0623a257b) C:\WINDOWS\system32\drivers\vinyl97.sys
2011/02/05 10:27:06.0796 2768 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/02/05 10:27:06.0968 2768 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/02/05 10:27:07.0171 2768 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/02/05 10:27:07.0625 2768 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/02/05 10:27:07.0734 2768 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2011/02/05 10:27:07.0812 2768 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2011/02/05 10:27:08.0265 2768 ================================================================================
2011/02/05 10:27:08.0265 2768 Scan finished
2011/02/05 10:27:08.0265 2768 ================================================================================






-- Said nothing was found.

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 05 February 2011 - 04:49 PM

Please run both MBAM and SAS

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#7 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 07 February 2011 - 12:11 PM

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5688

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/7/2011 8:36:17 AM
mbam-log-2011-02-07 (08-36-17).txt

Scan type: Full scan (A:\|C:\|D:\|E:\|)
Objects scanned: 263647
Time elapsed: 3 hour(s), 0 minute(s), 15 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 8
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 2
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127AD2-394B-70F5-C650-B97867BAA1F7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127AD2-394B-70F5-C650-B97867BAA1F7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43BF8CD1-C5D5-2230-7BB2-98F22C2B7DC6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43BF8CD1-C5D5-2230-7BB2-98F22C2B7DC6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494E6CEC-7483-A4EE-0938-895519A84BC7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494E6CEC-7483-A4EE-0938-895519A84BC7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\WhiteSmokeTranslator (PUP.WhiteSmoke) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\WhiteSmokeTranslator (PUP.WhiteSmoke) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
c:\documents and settings\networkservice\application data\whitesmoketoolbar (PUP.WhiteSmoke) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\application data\whitesmoketranslator (PUP.WhiteSmoke) -> Quarantined and deleted successfully.

Files Infected:
c:\documents and settings\networkservice\application data\whitesmoketoolbar\dtx.ini (PUP.WhiteSmoke) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\application data\whitesmoketoolbar\exeArgs.xml (PUP.WhiteSmoke) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\application data\whitesmoketoolbar\guid.dat (PUP.WhiteSmoke) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\application data\whitesmoketoolbar\setupCfg.xml (PUP.WhiteSmoke) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\application data\whitesmoketranslator\stat.log (PUP.WhiteSmoke) -> Quarantined and deleted successfully.



---------------------------------------------------------------------------------


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/07/2011 at 07:30 AM

Application Version : 4.48.1000

Core Rules Database Version : 6350
Trace Rules Database Version: 4162

Scan type : Complete Scan
Total Scan Time : 04:20:35

Memory items scanned : 600
Memory threats detected : 1
Registry items scanned : 8406
Registry threats detected : 24
File items scanned : 107477
File threats detected : 708

Trojan.Agent/Gen-Virut
C:\PROGRAM FILES\MCAFEE\VIRUSSCAN ENTERPRISE\SHSTAT.EXE
C:\PROGRAM FILES\MCAFEE\VIRUSSCAN ENTERPRISE\SHSTAT.EXE
[RemoteControl] C:\PROGRAM FILES\CYBERLINK\POWERDVD\PDVDSERV.EXE
C:\PROGRAM FILES\CYBERLINK\POWERDVD\PDVDSERV.EXE
[LWBMOUSE] C:\PROGRAM FILES\BELKIN MOUSE 1.0\MOUSE32A.EXE
C:\PROGRAM FILES\BELKIN MOUSE 1.0\MOUSE32A.EXE
[ATIPTA] C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE
[ccApp] C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
[HPHUPD06] C:\PROGRAM FILES\HP\{AAC4FC36-8F89-4587-8DD3-EBC57C83374D}\HPHUPD06.EXE
C:\PROGRAM FILES\HP\{AAC4FC36-8F89-4587-8DD3-EBC57C83374D}\HPHUPD06.EXE
[AppleSyncNotifier] C:\PROGRAM FILES\COMMON FILES\APPLE\MOBILE DEVICE SUPPORT\APPLESYNCNOTIFIER.EXE
C:\PROGRAM FILES\COMMON FILES\APPLE\MOBILE DEVICE SUPPORT\APPLESYNCNOTIFIER.EXE
[LiveMonitor] C:\PROGRAM FILES\MSI\LIVE UPDATE 3\LMONITOR.EXE
C:\PROGRAM FILES\MSI\LIVE UPDATE 3\LMONITOR.EXE
[McAfeeUpdaterUI] C:\PROGRAM FILES\MCAFEE\COMMON FRAMEWORK\UDATERUI.EXE
C:\PROGRAM FILES\MCAFEE\COMMON FRAMEWORK\UDATERUI.EXE
[ShStatEXE] C:\PROGRAM FILES\MCAFEE\VIRUSSCAN ENTERPRISE\SHSTAT.EXE
[HP Software Update] C:\PROGRAM FILES\HP\HP SOFTWARE UPDATE\HPWUSCHD2.EXE
C:\PROGRAM FILES\HP\HP SOFTWARE UPDATE\HPWUSCHD2.EXE
[bcmwltry] C:\WINDOWS\SYSTEM32\BCMWLTRY.EXE
C:\WINDOWS\SYSTEM32\BCMWLTRY.EXE
[Microsoft Default Manager] C:\PROGRAM FILES\MICROSOFT\SEARCH ENHANCEMENT PACK\DEFAULT MANAGER\DEFMGR.EXE
C:\PROGRAM FILES\MICROSOFT\SEARCH ENHANCEMENT PACK\DEFAULT MANAGER\DEFMGR.EXE
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\ccApp.exe
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\ccApp.exe#PATH
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
C:\QOOBOX\QUARANTINE\C\DOCUMENTS AND SETTINGS\PHILLIP WAITE\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\UPDATE\GOOGLEUPDATE.EXE.VIR
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\COMMON FILES\APPLE\MOBILE DEVICE SUPPORT\BIN\APPLESYNCNOTIFIER.EXE.VIR
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\HP\HPCORETECH\HPCMPMGR.EXE.VIR
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\WINDOWS MEDIA PLAYER\WMPNSCFG.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1370\A0383784.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1370\A0383785.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1370\A0383786.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1370\A0383791.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1391\A0392421.EXE
C:\WINDOWS\Prefetch\APPLESYNCNOTIFIER.EXE-06E62274.pf
C:\WINDOWS\Prefetch\ATIPTAXX.EXE-18FE8D8B.pf
C:\WINDOWS\Prefetch\BCMWLTRY.EXE-34CCE601.pf
C:\WINDOWS\Prefetch\CCAPP.EXE-1207B2A5.pf
C:\WINDOWS\Prefetch\DEFMGR.EXE-37CA0CC9.pf
C:\WINDOWS\Prefetch\HPHUPD06.EXE-2347A34D.pf
C:\WINDOWS\Prefetch\HPWUSCHD2.EXE-02F6D2DD.pf
C:\WINDOWS\Prefetch\LMONITOR.EXE-20D13860.pf
C:\WINDOWS\Prefetch\PDVDSERV.EXE-0448293E.pf
C:\WINDOWS\Prefetch\SHSTAT.EXE-29A2BE4E.pf
C:\WINDOWS\Prefetch\UDATERUI.EXE-1E769EA7.pf

Adware.Tracking Cookie
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@serving-sys[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@harrenmedianetwork[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@rotator.adjuggler[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@ad.yieldmanager[2].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@themediaczar[2].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@bursttraffic[2].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@zedo[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@limelightmediaservices[2].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@bs.serving-sys[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@content.yieldmanager[2].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@casalemedia[2].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@content.yieldmanager[3].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@atdmt[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@server.cpmstar[1].txt
C:\Documents and Settings\Phillip Waite\Cookies\phillip_waite@doubleclick[1].txt
crackle.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
media.heavy.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
media.scanscout.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
media1.break.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
objects.tremormedia.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
serving-sys.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\SHPUYVPU ]
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@harrenmedianetwork[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@limelightmediaservices[1].txt
2mdn.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
a.ads1.msn.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
adknowledge.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
ads1.msn.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
adsatt.espn.go.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
b.ads1.msn.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
bannerfarm.ace.advertising.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
cdn4.specificclick.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
crackle.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
ec.atdmt.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
files.youporn.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
googleads.g.doubleclick.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
ia.media-imdb.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
interclick.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
m1.2mdn.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
macromedia.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media.heavy.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media.ign.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media.newschoolers.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media.resulthost.org [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media.scanscout.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media.tattomedia.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
media1.break.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
memecounter.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
msnbcmedia.msn.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
msntest.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
oddcast.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
s0.2mdn.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
secure-us.imrworldwide.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
serving-sys.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
sftrack.searchforce.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
spe.atdmt.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
static.youporn.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
udn.specificclick.net [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
videomedia.ign.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
web.adknowledge.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
youporn.videobox.com [ C:\Documents and Settings\Phillip Waite\Application Data\Macromedia\Flash Player\#SharedObjects\9773ULQ2 ]
.americafirstcreditunion.122.2o7.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
bannerserve.utah.edu [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.legolas-media.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.legolas-media.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.a1.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.yadro.ru [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mardeltracking.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mardeltracking.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.technoratimedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.clicksor.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.clicksor.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.clicksor.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.clicksor.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.myroitracking.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.clicksor.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.clicksor.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.dodtracker.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adserver.adtechus.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.www.burstnet.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.burstnet.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.apmebf.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
user.lucidmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.r1-ads.ace.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adxpose.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adserver.adtechus.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media.adfrontiers.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
media.movies.ign.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
media.movies.ign.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
media.movies.ign.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media.adfrontiers.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.pro-market.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.clicker.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
stat.onestat.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
stat.onestat.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.andomedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
statse.webtrendslive.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ehg-verizon.hitbox.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ehg-verizon.hitbox.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.hitbox.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.hitbox.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.liveperson.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.liveperson.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adecn.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.a1.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.network.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.burstnet.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.a1.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.a1.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.a1.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediabrandsww.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.chitika.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.googleadservices.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.liveperson.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.googleadservices.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.googleadservices.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
counter.hitslink.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revenue.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.googleadservices.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.usta.122.2o7.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.questionmarket.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.questionmarket.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.statcounter.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
media.xbox360.ign.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
media.xbox360.ign.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
media.xbox360.ign.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.doubleclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.yieldmanager.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaforge.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tomsshoes.122.2o7.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.googleadservices.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.steelhousemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.steelhousemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.liveperson.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
server.iad.liveperson.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.burstnet.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.burstbeacon.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.burstbeacon.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.bs.serving-sys.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.lucidmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
dc.tremormedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.walmart.112.2o7.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.linksynergy.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.linksynergy.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.linksynergy.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.linksynergy.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tribalfusion.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.hisnakiamotors.122.2o7.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
network.realmedia.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.dodtracker.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.dodtracker.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.at.atwola.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\Phillip Waite\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ictv-ic-ec.indieclicktv.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\9T2SKUKK ]
media.mtvnservices.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\9T2SKUKK ]
media.theonion.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\9T2SKUKK ]
media1.break.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\9T2SKUKK ]
s0.2mdn.net [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\9T2SKUKK ]
secure-us.imrworldwide.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\9T2SKUKK ]
C:\WINDOWS\system32\config\systemprofile\Cookies\system@247realmedia[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@a1.interclick[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ad.ad-srv[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ad.doubleclick[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ad.wsod[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ad.yieldmanager[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ad.zanox[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adbrite[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adbrite[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adecn[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adinterax[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adlegend[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.ad4game[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.addynamix[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.admaxasia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.bridgetrack[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.e-planning[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.foodbuzz[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.gamesbannernet[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.gamesfree[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.intergi[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.networldmedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.pointroll[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.pubmatic[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.thefrisky[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.undertone[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.vimg[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adserver.adreactor[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adserver.adtechus[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adtech[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@advertising.sheknows[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@advertising[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@advertising[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@advertstream[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@adxpose[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@amtk-media[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@animetoplist[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@apmebf[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@at.atwola[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@atdmt[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@atwola[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@bs.serving-sys[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@burstbeacon[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@burstnet[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@casalemedia[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@cdn.uc.atwola[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@cdn1.trafficmp[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ces.rotator.hadj1.adjuggler[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@chicagosuntimes.122.2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@chitika[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@chmedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@citi.bridgetrack[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@clickfuse[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@clickplay.com[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@collective-media[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@content.yieldmanager[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@content.yieldmanager[3].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@counters.gigya[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@cracked[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@cracked[3].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@dc.tremormedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@dmtracker[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@dominionenterprises.112.2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@doubleclick[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@eas.apm.emediate[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@edgeadx[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ehg-techtarget.hitbox[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@eyewonder[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@fastclick[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@fidelity.rotator.hadj7.adjuggler[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@game-advertising-online[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@hitbox[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@hpi.rotator.hadj7.adjuggler[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@imrworldwide[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@insightexpressai[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@interclick[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@invitemedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@kanoodle[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@kontera[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@legolas-media[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@loralparis2011.solution.weborama[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@lucidmedia[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@media.adfrontiers[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@media.mtvnservices[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@media6degrees[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@mediabrandsww[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@mediaplex[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@msnbc.112.2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@network.realmedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@networldmedia[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@nextag[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@overture[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@petfinder[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@pointroll[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@pro-market[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@qnsr[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@questionmarket[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@r1-ads.ace.advertising[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@realmedia[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@revenue[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@revsci[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@rotator.hadj7.adjuggler[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ru4[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@seedmediagroup[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@server.cpmstar[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@serving-sys[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@specificclick[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@specificmedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@sportingnews.122.2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@statcounter[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@stats.complex[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@tacoda.at.atwola[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@tacoda[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@themis-media[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@timeinc.122.2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@tradedoubler[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@trafficmp[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@tribalfusion[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@user.lucidmedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@viacom.adbureau[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@vitamine.networldmedia[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@vitamine.networldmedia[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@weborama[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@wstat.wibiya[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.burstbeacon[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.burstnet[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.cracked[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.mediabistro[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.qsstats[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.qsstats[3].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.revenuemantra[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.seedmediagroup[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www3.addfreestats[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www5.addfreestats[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www6.addfreestats[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@xiti[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@yadro[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@yieldmanager[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@zanox[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@zedo[1].txt

Backdoor.Bot[ZBot]
HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7}
HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7}
HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6}
HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6}

PUP.Whitesmoke
HKLM\SOFTWARE\WhiteSmokeTranslator
HKLM\SOFTWARE\WhiteSmokeTranslator#InstallOption
HKLM\SOFTWARE\WhiteSmokeTranslator#DistID
HKU\.DEFAULT\Software\WhiteSmokeTranslator
HKU\S-1-5-21-1715567821-1644491937-725345543-1004\Software\WhiteSmokeTranslator
HKU\S-1-5-18\Software\WhiteSmokeTranslator

Application.PowerReg Scheduler
C:\DOCUMENTS AND SETTINGS\PHILLIP WAITE\START MENU\PROGRAMS\STARTUP\POWERREG SCHEDULER V3.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1386\A0390139.EXE
C:\WINDOWS\Prefetch\POWERREG SCHEDULER V3.EXE-0F3AF0F1.pf

Trojan.Agent/Gen-Nullo[Short]
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\SDRA64.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1370\A0383801.EXE


----------------------------------------------------------------
Sweet, that helped quite a bit

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 07 February 2011 - 02:27 PM

Combofix doesn't yet remove all elements of the malware that we've just stripped off the machine. I notice that a Combofix folder is present and I can't stress enough that you should not be using this program on your own and without support from an expert.

I would like a run of Combofix to check this so if it is still on the machine (as I suspect it is) then rerun the program and agree any updates. When it's finished post the log.
Posted Image
m0le is a proud member of UNITE

#9 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 07 February 2011 - 08:03 PM

Yeah my brother used Combofix in the past. Here is the report I just got;


ComboFix 11-02-06.02 - Phillip Waite 02/07/2011 17:36:21.2.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1535.981 [GMT -7:00]
Running from: c:\documents and settings\Phillip Waite\Desktop\ComboFix.exe
AV: Norton Internet Security *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton Internet Security *Disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
.

((((((((((((((((((((((((( Files Created from 2011-01-08 to 2011-02-08 )))))))))))))))))))))))))))))))
.

2011-02-07 10:03 . 2011-02-07 10:03 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\SUPERAntiSpyware.com
2011-02-07 10:03 . 2011-02-07 10:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\Malwarebytes
2011-02-06 06:34 . 2010-12-21 01:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-02-06 06:34 . 2010-12-21 01:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- C:\Malwarebytes' Anti-Malware
2011-01-23 06:37 . 2011-01-23 06:37 -------- d-sh--w- c:\windows\system32\config\systemprofile\IETldCache
2011-01-23 06:35 . 2011-01-23 06:35 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2011-01-20 06:16 . 2001-08-17 20:56 7552 -c--a-w- c:\windows\system32\dllcache\sonypvu1.sys
2011-01-20 06:16 . 2001-08-17 20:56 7552 ----a-w- c:\windows\system32\drivers\SONYPVU1.SYS
2011-01-17 08:52 . 2011-01-17 08:52 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2011-01-14 18:19 . 2011-02-07 23:03 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\skypePM
2011-01-14 18:15 . 2011-01-14 18:15 -------- d-----w- c:\program files\Common Files\Skype
2011-01-14 18:15 . 2011-01-14 18:17 -------- d-----r- c:\program files\Skype
2011-01-14 18:15 . 2011-02-08 00:17 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\Skype
2011-01-14 18:15 . 2011-01-14 18:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2011-01-12 18:41 . 2011-01-12 18:46 -------- d-----w- C:\22ed6d5d62f3487ab82e6e
2011-01-11 19:11 . 2011-01-13 18:11 21840 ----atw- c:\windows\system32\SIntfNT.dll
2011-01-11 19:11 . 2011-01-13 18:11 17212 ----atw- c:\windows\system32\SIntf32.dll
2011-01-11 19:11 . 2011-01-13 18:11 12067 ----atw- c:\windows\system32\SIntf16.dll
2011-01-11 06:05 . 2011-01-11 06:05 -------- d-----w- c:\program files\Infogrames Interactive
2011-01-11 05:54 . 2011-01-11 05:54 94208 ----a-w- c:\windows\DIIUnin.exe
2011-01-11 05:54 . 2011-01-11 05:54 2829 ----a-w- c:\windows\DIIUnin.pif
2011-01-11 05:50 . 2011-01-13 18:18 -------- d-----w- c:\program files\Diablo II

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-11-30 00:38 . 2010-11-30 00:38 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2010-11-30 00:38 . 2010-11-30 00:38 69632 ----a-w- c:\windows\system32\QuickTime.qts
2010-11-18 18:12 . 2006-02-17 04:51 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-13 01:53 . 2010-12-26 22:35 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-11-12 23:34 . 2008-09-21 20:11 73728 ----a-w- c:\windows\system32\javacpl.cpl
2008-10-11 16:53 . 2009-08-23 16:15 262144 ----a-w- c:\program files\Uninstall Ask Toolbar.dll
2007-09-09 19:42 . 2007-09-09 19:42 563200 ------w- c:\program files\raswin.exe
.
<pre>
c:\program files\ATI Technologies\ATI Control Panel\atiptaxx .exe
c:\program files\Belkin Mouse 1.0\MOUSE32A .exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier .exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier .exe
c:\program files\Common Files\Symantec Shared\ccApp .exe
c:\program files\CyberLink\PowerDVD\PDVDServ .exe
c:\program files\HP\HP Software Update\HPWuSchd2 .exe
c:\program files\HP\hpcoretech\hpcmpmgr .exe
c:\program files\HP\{AAC4FC36-8F89-4587-8DD3-EBC57C83374D}\hphupd06 .exe
c:\program files\iTunes\iTunesHelper .exe
c:\program files\McAfee\Common Framework\udaterui .exe
c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr .exe
c:\program files\MSI\Live Update 3\LMonitor .exe
c:\program files\QuickTime\qttask                                                                                                                                                                                                                              .exe
c:\program files\Windows Media Player\WMPNSCFG .exe
c:\windows\system32\bcmwltry .exe
</pre>

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [N/A]
"Google Update"="c:\documents and settings\Phillip Waite\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [N/A]
"SUPERAntiSpyware"="c:\documents and settings\Phillip Waite\Desktop\SUPERAntiSpyware.exe" [2011-01-13 2424560]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\qttask .exe -atboottime" [X]
"C-Media Mixer"="Mixer.exe" [2002-10-16 1818624]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Symantec NetDriver Monitor"="c:\progra~1\SYMNET~1\SNDMon.exe" [2006-02-17 100056]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-12-10 7311360]
"nwiz"="nwiz.exe" [2005-12-10 1519616]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2005-12-10 86016]
"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb11.exe" [2004-04-06 172032]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [N/A]
"HPHmon06"="c:\windows\system32\hphmon06.exe" [2004-06-07 659456]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-01-25 421160]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [N/A]
"removecpl"="RemoveCpl.exe" [N/A]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\udaterui.exe" [2008-03-14 136512]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
HP Digital Imaging Monitor.lnk - c:\program files\HP\digital imaging\bin\hpqtra08.exe [2005-12-15 282624]
MacName.lnk - c:\program files\MacOpener\MacName.exe [2006-2-25 53340]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-17 65588]
NkbMonitor.exe.lnk - c:\program files\Nikon\PictureProject\NkbMonitor.exe [2006-3-26 118784]
PC Alert 4.lnk - c:\program files\MSI\PC Alert 4\PCAlert4.exe [2006-2-21 540672]
SecureDoc.lnk - c:\program files\MSI\SecureDoc\Logon.exe [N/A]
Windows Desktop Search.lnk - c:\program files\MSN Toolbar Suite\DS\02.05.0001.1119\en-us\bin\WindowsSearch.exe [2005-9-20 238080]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\documents and settings\Phillip Waite\Desktop\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\documents and settings\Phillip Waite\Desktop\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Common Framework\\FrameworkService.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\digital imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\digital imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\EMPIRES2.ICD"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\age2_x1\\AGE2_X1.ICD"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizzard Downloader
"6112:TCP"= 6112:TCP:Blizzard Downloader
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"5985:TCP"= 5985:TCP:*:Disabled:Windows Remote Management

R0 MacOpen;MacOpen;c:\windows\system32\drivers\MacOpen.sys [2/25/2006 9:57 AM 180316]
R1 SASDIFSV;SASDIFSV;c:\documents and settings\Phillip Waite\Desktop\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\documents and settings\Phillip Waite\Desktop\SASKUTIL.SYS [5/10/2010 11:41 AM 67656]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe --> c:\windows\system32\mfevtps.exe [?]
R2 NkPtpEnumP2;NkPtpEnumP2;c:\program files\Nikon\Wireless Camera Setup Utility\NkPtpEnum.exe [6/17/2005 10:11 AM 24064]
R2 sprtlisten;SupportSoft Listener Service;c:\program files\Common Files\supportsoft\bin\sprtlisten.exe [1/8/2008 11:02 AM 1213728]
R3 VBus;Virtual Bus;c:\windows\system32\drivers\NkVBus.sys [6/17/2005 11:11 AM 17664]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 gupdate1ca0adbc6673a90;Google Update Service (gupdate1ca0adbc6673a90);c:\program files\Google\Update\GoogleUpdate.exe [7/22/2009 7:50 AM 133104]
S2 IcRecUsb;IC Recorder Driver;c:\windows\system32\drivers\IcRecUsb.sys [7/4/2006 6:53 AM 17432]
S3 dwfdpnttsh;dwfdpnttsh;\??\c:\program files\Pat's\My Mods\dwfdpnttsh.sys --> c:\program files\Pat's\My Mods\dwfdpnttsh.sys [?]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys --> c:\windows\system32\drivers\mferkdet.sys [?]
S3 nv3;nv3;c:\windows\system32\drivers\nv3.sys [2/20/2006 2:01 PM 198144]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [3/31/2003 5:00 AM 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - SASDIFSV
*NewlyCreated* - SASKUTIL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
Contents of the 'Scheduled Tasks' folder

2011-02-04 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 18:50]

2011-02-07 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-27 23:06]

2011-02-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-22 14:50]

2011-02-07 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-22 14:50]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://qwest.live.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = <local>;*.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: &MSN Search - c:\program files\MSN Toolbar Suite\TB\02.05.0001.1119\en-us\msntb.dll/search.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
IE: Open in new background tab - c:\program files\MSN Toolbar Suite\TAB\02.05.0001.1119\en-us\msntabres.dll/229?7349b96d3b674236bb99b277f2898365
IE: Open in new foreground tab - c:\program files\MSN Toolbar Suite\TAB\02.05.0001.1119\en-us\msntabres.dll/230?7349b96d3b674236bb99b277f2898365
Trusted Zone: yahoo.com\music
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-02-07 17:46
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f4,a6,e7,32,d1,00,a6,44,bb,2d,f2,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f4,a6,e7,32,d1,00,a6,44,bb,2d,f2,\
"6256FFB019F8FDFBD36745B06F4540E9AEAF222A25"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f4,a6,e7,32,d1,00,a6,44,bb,2d,f2,\

[HKEY_USERS\S-1-5-21-1715567821-1644491937-725345543-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
@DACL=(02 0000)
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
@DACL=(02 0000)
"NoChange"="1"
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
@DACL=(02 0000)
"Installed"="1"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(828)
c:\documents and settings\Phillip Waite\Desktop\SASWINLO.DLL
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2824)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2011-02-07 17:57:35
ComboFix-quarantined-files.txt 2011-02-08 00:57
ComboFix2.txt 2011-01-13 18:08

Pre-Run: 135,166,709,760 bytes free
Post-Run: 135,337,447,424 bytes free

- - End Of File - - 20D55BC6D70AD7D939E6E34BA0C7CA11

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 08 February 2011 - 07:40 PM

We need to remove this file infector.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

RenV::
c:\program files\ATI Technologies\ATI Control Panel\atiptaxx .exe
c:\program files\Belkin Mouse 1.0\MOUSE32A .exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier .exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier .exe
c:\program files\Common Files\Symantec Shared\ccApp .exe
c:\program files\CyberLink\PowerDVD\PDVDServ .exe
c:\program files\HP\HP Software Update\HPWuSchd2 .exe
c:\program files\HP\hpcoretech\hpcmpmgr .exe
c:\program files\HP\{AAC4FC36-8F89-4587-8DD3-EBC57C83374D}\hphupd06 .exe
c:\program files\iTunes\iTunesHelper .exe
c:\program files\McAfee\Common Framework\udaterui .exe
c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr .exe
c:\program files\MSI\Live Update 3\LMonitor .exe
c:\program files\QuickTime\qttask                                                                                                                                                                                                                              .exe
c:\program files\Windows Media Player\WMPNSCFG .exe
c:\windows\system32\bcmwltry .exe

Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#11 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 09 February 2011 - 03:45 AM

ComboFix 11-02-08.03 - Phillip Waite 02/09/2011 1:32.4.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1535.1068 [GMT -7:00]
Running from: c:\documents and settings\Phillip Waite\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Phillip Waite\Desktop\CFScript.txt
AV: Norton Internet Security *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton Internet Security *Disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
.

((((((((((((((((((((((((( Files Created from 2011-01-09 to 2011-02-09 )))))))))))))))))))))))))))))))
.

2011-02-07 10:03 . 2011-02-07 10:03 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\SUPERAntiSpyware.com
2011-02-07 10:03 . 2011-02-07 10:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\Malwarebytes
2011-02-06 06:34 . 2010-12-21 01:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-02-06 06:34 . 2010-12-21 01:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- C:\Malwarebytes' Anti-Malware
2011-01-23 06:37 . 2011-01-23 06:37 -------- d-sh--w- c:\windows\system32\config\systemprofile\IETldCache
2011-01-23 06:35 . 2011-01-23 06:35 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2011-01-20 06:16 . 2001-08-17 20:56 7552 -c--a-w- c:\windows\system32\dllcache\sonypvu1.sys
2011-01-20 06:16 . 2001-08-17 20:56 7552 ----a-w- c:\windows\system32\drivers\SONYPVU1.SYS
2011-01-17 08:52 . 2011-01-17 08:52 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2011-01-14 18:19 . 2011-02-08 15:25 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\skypePM
2011-01-14 18:15 . 2011-01-14 18:15 -------- d-----w- c:\program files\Common Files\Skype
2011-01-14 18:15 . 2011-01-14 18:17 -------- d-----r- c:\program files\Skype
2011-01-14 18:15 . 2011-02-08 21:09 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\Skype
2011-01-14 18:15 . 2011-01-14 18:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2011-01-12 18:41 . 2011-01-12 18:46 -------- d-----w- C:\22ed6d5d62f3487ab82e6e
2011-01-11 19:11 . 2011-01-13 18:11 21840 ----atw- c:\windows\system32\SIntfNT.dll
2011-01-11 19:11 . 2011-01-13 18:11 17212 ----atw- c:\windows\system32\SIntf32.dll
2011-01-11 19:11 . 2011-01-13 18:11 12067 ----atw- c:\windows\system32\SIntf16.dll
2011-01-11 06:05 . 2011-01-11 06:05 -------- d-----w- c:\program files\Infogrames Interactive
2011-01-11 05:54 . 2011-01-11 05:54 94208 ----a-w- c:\windows\DIIUnin.exe
2011-01-11 05:54 . 2011-01-11 05:54 2829 ----a-w- c:\windows\DIIUnin.pif
2011-01-11 05:50 . 2011-01-13 18:18 -------- d-----w- c:\program files\Diablo II

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-11-30 00:38 . 2010-11-30 00:38 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2010-11-30 00:38 . 2010-11-30 00:38 69632 ----a-w- c:\windows\system32\QuickTime.qts
2010-11-18 18:12 . 2006-02-17 04:51 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-13 01:53 . 2010-12-26 22:35 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-11-12 23:34 . 2008-09-21 20:11 73728 ----a-w- c:\windows\system32\javacpl.cpl
2008-10-11 16:53 . 2009-08-23 16:15 262144 ----a-w- c:\program files\Uninstall Ask Toolbar.dll
2007-09-09 19:42 . 2007-09-09 19:42 563200 ------w- c:\program files\raswin.exe
.

((((((((((((((((((((((((((((( SnapShot@2011-02-08_00.46.39 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-02-09 06:44 . 2011-02-09 06:44 16384 c:\windows\Temp\Perflib_Perfdata_1d4.dat
+ 2011-02-09 06:50 . 2011-02-09 06:50 10134 c:\windows\Installer\{A638557B-1F13-40A0-9627-C892FBCA6960}\ARPPRODUCTICON.exe
- 2011-02-07 17:10 . 2011-02-07 17:10 10134 c:\windows\Installer\{A638557B-1F13-40A0-9627-C892FBCA6960}\ARPPRODUCTICON.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]
"SUPERAntiSpyware"="c:\documents and settings\Phillip Waite\Desktop\SUPERAntiSpyware.exe" [2011-01-13 2424560]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\qttask .exe -atboottime" [X]
"C-Media Mixer"="Mixer.exe" [2002-10-16 1818624]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Symantec NetDriver Monitor"="c:\progra~1\SYMNET~1\SNDMon.exe" [2006-02-17 100056]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-12-10 7311360]
"nwiz"="nwiz.exe" [2005-12-10 1519616]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2005-12-10 86016]
"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb11.exe" [2004-04-06 172032]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
"HPHmon06"="c:\windows\system32\hphmon06.exe" [2004-06-07 659456]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-14 421160]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\udaterui.exe" [2008-03-14 136512]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
HP Digital Imaging Monitor.lnk - c:\program files\HP\digital imaging\bin\hpqtra08.exe [2005-12-15 282624]
MacName.lnk - c:\program files\MacOpener\MacName.exe [2006-2-25 53340]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-17 65588]
NkbMonitor.exe.lnk - c:\program files\Nikon\PictureProject\NkbMonitor.exe [2006-3-26 118784]
PC Alert 4.lnk - c:\program files\MSI\PC Alert 4\PCAlert4.exe [2006-2-21 540672]
SecureDoc.lnk - c:\program files\MSI\SecureDoc\Logon.exe [N/A]
Windows Desktop Search.lnk - c:\program files\MSN Toolbar Suite\DS\02.05.0001.1119\en-us\bin\WindowsSearch.exe [2005-9-20 238080]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\documents and settings\Phillip Waite\Desktop\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\documents and settings\Phillip Waite\Desktop\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Common Framework\\FrameworkService.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\digital imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\digital imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\EMPIRES2.ICD"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\age2_x1\\AGE2_X1.ICD"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizzard Downloader
"6112:TCP"= 6112:TCP:Blizzard Downloader
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"5985:TCP"= 5985:TCP:*:Disabled:Windows Remote Management

R0 MacOpen;MacOpen;c:\windows\system32\drivers\MacOpen.sys [2/25/2006 9:57 AM 180316]
R1 SASDIFSV;SASDIFSV;c:\documents and settings\Phillip Waite\Desktop\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\documents and settings\Phillip Waite\Desktop\SASKUTIL.SYS [5/10/2010 11:41 AM 67656]
R2 NkPtpEnumP2;NkPtpEnumP2;c:\program files\Nikon\Wireless Camera Setup Utility\NkPtpEnum.exe [6/17/2005 10:11 AM 24064]
R2 sprtlisten;SupportSoft Listener Service;c:\program files\Common Files\supportsoft\bin\sprtlisten.exe [1/8/2008 11:02 AM 1213728]
R3 VBus;Virtual Bus;c:\windows\system32\drivers\NkVBus.sys [6/17/2005 11:11 AM 17664]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 gupdate1ca0adbc6673a90;Google Update Service (gupdate1ca0adbc6673a90);c:\program files\Google\Update\GoogleUpdate.exe [7/22/2009 7:50 AM 133104]
S2 IcRecUsb;IC Recorder Driver;c:\windows\system32\drivers\IcRecUsb.sys [7/4/2006 6:53 AM 17432]
S3 dwfdpnttsh;dwfdpnttsh;\??\c:\program files\Pat's\My Mods\dwfdpnttsh.sys --> c:\program files\Pat's\My Mods\dwfdpnttsh.sys [?]
S3 nv3;nv3;c:\windows\system32\drivers\nv3.sys [2/20/2006 2:01 PM 198144]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [3/31/2003 5:00 AM 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
Contents of the 'Scheduled Tasks' folder

2011-02-04 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 18:50]

2011-02-09 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-27 23:06]

2011-02-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-22 14:50]

2011-02-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-22 14:50]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://qwest.live.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = <local>;*.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: &MSN Search - c:\program files\MSN Toolbar Suite\TB\02.05.0001.1119\en-us\msntb.dll/search.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
IE: Open in new background tab - c:\program files\MSN Toolbar Suite\TAB\02.05.0001.1119\en-us\msntabres.dll/229?7349b96d3b674236bb99b277f2898365
IE: Open in new foreground tab - c:\program files\MSN Toolbar Suite\TAB\02.05.0001.1119\en-us\msntabres.dll/230?7349b96d3b674236bb99b277f2898365
Trusted Zone: yahoo.com\music
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Google Update - c:\documents and settings\Phillip Waite\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
HKLM-Run-SunJavaUpdateSched - c:\program files\Java\jre6\bin\jusched.exe
HKLM-Run-removecpl - RemoveCpl.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-02-09 01:38
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f4,a6,e7,32,d1,00,a6,44,bb,2d,f2,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f4,a6,e7,32,d1,00,a6,44,bb,2d,f2,\
"6256FFB019F8FDFBD36745B06F4540E9AEAF222A25"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f4,a6,e7,32,d1,00,a6,44,bb,2d,f2,\

[HKEY_USERS\S-1-5-21-1715567821-1644491937-725345543-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
@DACL=(02 0000)
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
@DACL=(02 0000)
"NoChange"="1"
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
@DACL=(02 0000)
"Installed"="1"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(796)
c:\documents and settings\Phillip Waite\Desktop\SASWINLO.DLL
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2096)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
c:\documents and settings\Phillip Waite\Desktop\SASSEH.DLL
c:\program files\MSN Toolbar Suite\TB\02.05.0001.1119\en-us\msntb.dll
c:\program files\MSN Toolbar Suite\TB\02.05.0001.1119\en-us\mtbres.dll
c:\program files\MSN Toolbar Suite\HV\02.05.0000.1082\en-us\hvres.dll
c:\program files\MSN Toolbar Suite\FF\02.05.0000.1082\en-us\msnffres.dll
c:\program files\MSN Toolbar Suite\PB\02.05.0000.1082\en-us\pgres.dll
.
Completion time: 2011-02-09 01:42:33
ComboFix-quarantined-files.txt 2011-02-09 08:42
ComboFix2.txt 2011-02-08 00:57
ComboFix3.txt 2011-01-13 18:08

Pre-Run: 135,323,320,320 bytes free
Post-Run: 135,288,451,072 bytes free

- - End Of File - - 081B1E4E2E8F64AFE4D5C4BA9C09E5A0

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 09 February 2011 - 04:21 PM

That's worked fine. Now we can remove the driver

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

File::
c:\program files\Pat's\My Mods\dwfdpnttsh.sys

Driver::
dwfdpnttsh

RegLock::
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Please now run ESET's online scanner

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Leave the top box checked and then check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#13 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 09 February 2011 - 08:20 PM

ComboFix 11-02-09.02 - Phillip Waite 02/09/2011 15:08:00.5.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1535.1073 [GMT -7:00]
Running from: c:\documents and settings\Phillip Waite\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Phillip Waite\Desktop\CFScript.txt
AV: Norton Internet Security *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton Internet Security *Disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}

FILE ::
"c:\program files\Pat's\My Mods\dwfdpnttsh.sys"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_DWFDPNTTSH
-------\Service_dwfdpnttsh


((((((((((((((((((((((((( Files Created from 2011-01-09 to 2011-02-09 )))))))))))))))))))))))))))))))
.

2011-02-07 10:03 . 2011-02-07 10:03 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\SUPERAntiSpyware.com
2011-02-07 10:03 . 2011-02-07 10:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\Malwarebytes
2011-02-06 06:34 . 2010-12-21 01:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-02-06 06:34 . 2010-12-21 01:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-02-06 06:34 . 2011-02-06 06:34 -------- d-----w- C:\Malwarebytes' Anti-Malware
2011-01-23 06:37 . 2011-01-23 06:37 -------- d-sh--w- c:\windows\system32\config\systemprofile\IETldCache
2011-01-23 06:35 . 2011-01-23 06:35 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2011-01-20 06:16 . 2001-08-17 20:56 7552 -c--a-w- c:\windows\system32\dllcache\sonypvu1.sys
2011-01-20 06:16 . 2001-08-17 20:56 7552 ----a-w- c:\windows\system32\drivers\SONYPVU1.SYS
2011-01-17 08:52 . 2011-01-17 08:52 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2011-01-14 18:19 . 2011-02-09 20:18 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\skypePM
2011-01-14 18:15 . 2011-01-14 18:15 -------- d-----w- c:\program files\Common Files\Skype
2011-01-14 18:15 . 2011-01-14 18:17 -------- d-----r- c:\program files\Skype
2011-01-14 18:15 . 2011-02-09 22:02 -------- d-----w- c:\documents and settings\Phillip Waite\Application Data\Skype
2011-01-14 18:15 . 2011-01-14 18:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2011-01-12 18:41 . 2011-01-12 18:46 -------- d-----w- C:\22ed6d5d62f3487ab82e6e
2011-01-11 19:11 . 2011-01-13 18:11 21840 ----atw- c:\windows\system32\SIntfNT.dll
2011-01-11 19:11 . 2011-01-13 18:11 17212 ----atw- c:\windows\system32\SIntf32.dll
2011-01-11 19:11 . 2011-01-13 18:11 12067 ----atw- c:\windows\system32\SIntf16.dll
2011-01-11 06:05 . 2011-01-11 06:05 -------- d-----w- c:\program files\Infogrames Interactive
2011-01-11 05:54 . 2011-01-11 05:54 94208 ----a-w- c:\windows\DIIUnin.exe
2011-01-11 05:54 . 2011-01-11 05:54 2829 ----a-w- c:\windows\DIIUnin.pif
2011-01-11 05:50 . 2011-01-13 18:18 -------- d-----w- c:\program files\Diablo II

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-11-30 00:38 . 2010-11-30 00:38 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2010-11-30 00:38 . 2010-11-30 00:38 69632 ----a-w- c:\windows\system32\QuickTime.qts
2010-11-18 18:12 . 2006-02-17 04:51 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-13 01:53 . 2010-12-26 22:35 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-11-12 23:34 . 2008-09-21 20:11 73728 ----a-w- c:\windows\system32\javacpl.cpl
2008-10-11 16:53 . 2009-08-23 16:15 262144 ----a-w- c:\program files\Uninstall Ask Toolbar.dll
2007-09-09 19:42 . 2007-09-09 19:42 563200 ------w- c:\program files\raswin.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]
"SUPERAntiSpyware"="c:\documents and settings\Phillip Waite\Desktop\SUPERAntiSpyware.exe" [2011-01-13 2424560]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\qttask .exe -atboottime" [X]
"C-Media Mixer"="Mixer.exe" [2002-10-16 1818624]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Symantec NetDriver Monitor"="c:\progra~1\SYMNET~1\SNDMon.exe" [2006-02-17 100056]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-12-10 7311360]
"nwiz"="nwiz.exe" [2005-12-10 1519616]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2005-12-10 86016]
"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb11.exe" [2004-04-06 172032]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
"HPHmon06"="c:\windows\system32\hphmon06.exe" [2004-06-07 659456]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-14 421160]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\udaterui.exe" [2008-03-14 136512]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
HP Digital Imaging Monitor.lnk - c:\program files\HP\digital imaging\bin\hpqtra08.exe [2005-12-15 282624]
MacName.lnk - c:\program files\MacOpener\MacName.exe [2006-2-25 53340]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-17 65588]
NkbMonitor.exe.lnk - c:\program files\Nikon\PictureProject\NkbMonitor.exe [2006-3-26 118784]
PC Alert 4.lnk - c:\program files\MSI\PC Alert 4\PCAlert4.exe [2006-2-21 540672]
SecureDoc.lnk - c:\program files\MSI\SecureDoc\Logon.exe [N/A]
Windows Desktop Search.lnk - c:\program files\MSN Toolbar Suite\DS\02.05.0001.1119\en-us\bin\WindowsSearch.exe [2005-9-20 238080]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\documents and settings\Phillip Waite\Desktop\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\documents and settings\Phillip Waite\Desktop\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Common Framework\\FrameworkService.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\digital imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\digital imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\digital imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\EMPIRES2.ICD"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\age2_x1\\AGE2_X1.ICD"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizzard Downloader
"6112:TCP"= 6112:TCP:Blizzard Downloader
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"5985:TCP"= 5985:TCP:*:Disabled:Windows Remote Management

R0 MacOpen;MacOpen;c:\windows\system32\drivers\MacOpen.sys [2/25/2006 9:57 AM 180316]
R1 SASDIFSV;SASDIFSV;c:\documents and settings\Phillip Waite\Desktop\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\documents and settings\Phillip Waite\Desktop\SASKUTIL.SYS [5/10/2010 11:41 AM 67656]
R2 NkPtpEnumP2;NkPtpEnumP2;c:\program files\Nikon\Wireless Camera Setup Utility\NkPtpEnum.exe [6/17/2005 10:11 AM 24064]
R2 sprtlisten;SupportSoft Listener Service;c:\program files\Common Files\supportsoft\bin\sprtlisten.exe [1/8/2008 11:02 AM 1213728]
R3 PCAlertDriver;PCAlertDriver;c:\program files\MSI\PC Alert 4\NTGLM7X.SYS [2/21/2006 10:30 PM 21760]
R3 VBus;Virtual Bus;c:\windows\system32\drivers\NkVBus.sys [6/17/2005 11:11 AM 17664]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 gupdate1ca0adbc6673a90;Google Update Service (gupdate1ca0adbc6673a90);c:\program files\Google\Update\GoogleUpdate.exe [7/22/2009 7:50 AM 133104]
S2 IcRecUsb;IC Recorder Driver;c:\windows\system32\drivers\IcRecUsb.sys [7/4/2006 6:53 AM 17432]
S3 nv3;nv3;c:\windows\system32\drivers\nv3.sys [2/20/2006 2:01 PM 198144]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [3/31/2003 5:00 AM 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - PCALERTDRIVER

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
Contents of the 'Scheduled Tasks' folder

2011-02-04 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 18:50]

2011-02-09 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-27 23:06]

2011-02-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-22 14:50]

2011-02-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-22 14:50]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://qwest.live.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = <local>;*.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: &MSN Search - c:\program files\MSN Toolbar Suite\TB\02.05.0001.1119\en-us\msntb.dll/search.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
IE: Open in new background tab - c:\program files\MSN Toolbar Suite\TAB\02.05.0001.1119\en-us\msntabres.dll/229?7349b96d3b674236bb99b277f2898365
IE: Open in new foreground tab - c:\program files\MSN Toolbar Suite\TAB\02.05.0001.1119\en-us\msntabres.dll/230?7349b96d3b674236bb99b277f2898365
Trusted Zone: yahoo.com\music
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-02-09 15:23
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1715567821-1644491937-725345543-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
@DACL=(02 0000)
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
@DACL=(02 0000)
"NoChange"="1"
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
@DACL=(02 0000)
"Installed"="1"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(796)
c:\documents and settings\Phillip Waite\Desktop\SASWINLO.DLL
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(3256)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\MacOpener\FORMATM.EXE
c:\windows\system32\nvsvc32.exe
c:\windows\system32\HPZipm12.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\Windows Media Player\WMPNetwk.exe
c:\windows\system32\msiexec.exe
c:\program files\McAfee\Common Framework\FrameworkService.exe
c:\program files\McAfee\Common Framework\naPrdMgr.exe
c:\windows\system32\wscntfy.exe
c:\windows\Mixer.exe
c:\program files\McAfee\Common Framework\McTray.exe
c:\program files\MSN Toolbar Suite\DS\02.05.0001.1119\en-us\bin\WindowsSearchIndexer.exe
c:\windows\system32\MsiExec.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2011-02-09 15:30:03 - machine was rebooted
ComboFix-quarantined-files.txt 2011-02-09 22:30
ComboFix2.txt 2011-02-09 08:42
ComboFix3.txt 2011-02-08 00:57
ComboFix4.txt 2011-01-13 18:08

Pre-Run: 135,191,310,336 bytes free
Post-Run: 135,056,756,736 bytes free

- - End Of File - - 66FBB2BC97BD76909EEA7E51D54A1ED3

-------------------------------------------------------------------------------------------------------------------


C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\10\4c562fca-323ffcc7 multiple threats deleted - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\50\170b44f2-5ea8e3aa multiple threats deleted - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\9\58413909-16577405 multiple threats deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\_sdra64_.exe.zip a variant of Win32/Kryptik.JJF trojan deleted - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394306.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394307.EXE a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394308.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394309.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394310.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394311.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394312.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394313.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394314.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394315.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394316.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394317.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394318.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394319.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394320.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394321.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394322.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394323.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394324.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394325.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394326.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394327.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394328.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394329.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394330.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394331.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394332.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394333.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394334.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394335.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394336.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394337.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394338.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394339.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394340.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394341.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394342.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394343.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394344.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394345.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394346.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394347.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394348.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394349.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394350.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394351.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394352.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394353.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394354.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394355.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394356.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394357.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394358.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394359.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394360.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394361.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394362.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394363.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394364.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394365.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394366.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394367.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394368.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394369.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394370.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394371.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394372.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394373.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394374.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394375.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394376.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394377.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394378.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394379.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394380.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394381.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394382.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394383.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394384.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394385.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394386.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394387.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394388.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394389.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394390.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394391.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394392.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394393.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394394.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394395.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394396.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394397.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394398.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394399.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394400.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394401.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394402.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394403.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394404.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394405.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394406.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394407.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394408.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394409.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394410.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394411.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394412.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394413.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394414.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394415.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394416.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394417.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394418.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394419.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394420.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394421.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394422.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394423.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394424.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394425.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394426.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394427.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394428.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394429.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394430.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394431.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394432.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394433.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394434.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394435.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394436.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394437.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394438.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394439.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394440.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394441.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394442.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394443.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394444.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394445.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394446.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394447.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394448.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394449.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394450.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394451.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394452.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394453.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394454.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394455.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394456.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394457.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394458.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394459.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394460.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394461.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394462.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394463.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394464.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394465.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394466.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394467.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394468.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394469.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394470.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394471.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394472.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394473.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394474.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394475.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394476.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394477.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394478.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394479.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394480.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394481.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394482.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394483.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394484.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394485.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394486.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394487.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394488.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394489.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394490.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394491.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394492.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394493.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394494.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394495.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394496.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394497.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394498.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394499.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394500.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394501.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394502.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394503.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394504.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394505.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394506.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394507.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394508.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394509.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394510.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394511.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394512.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394513.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394514.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394515.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394516.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394517.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394518.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394519.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394520.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394521.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394522.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394523.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394524.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394525.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394526.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394527.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394528.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394529.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394530.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394531.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394532.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394533.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394534.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394535.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394536.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0394537.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0457546.EXE a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{DBD833F8-7782-43AD-8138-1E1B4958ACA2}\RP1394\A0457547.exe a variant of Win32/Kryptik.JGL trojan cleaned by deleting - quarantined
--------------------------------------------------------------------------------------------------------------------

Sorry it took so long to reply, with those scans combined it took nearly.. 4 hours in scan time..

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:19 PM

Posted 10 February 2011 - 02:09 PM

Lots of entries but nothing actually live. There were copies in the system restore folder and Java cache and one in Combofix's quarantine folder.

How's the machine performing?
Posted Image
m0le is a proud member of UNITE

#15 patrick.waite01

patrick.waite01
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:19 PM

Posted 10 February 2011 - 02:20 PM

Pretty good, a lot better then it was a couple weeks ago! Is there anything else you would like me to do?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users