Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirect Virus


  • This topic is locked This topic is locked
17 replies to this topic

#1 benstrashaccount

benstrashaccount

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 05 November 2011 - 05:09 PM

When I use any search engine to look up a topic, the links take me to other non-related sites. I have used several anti-virus programs and none of them are fixing the problem. It happens when I use Mozilla and Explorer, but not Chrome. I don't feel safe using even Chrome if there is a virus somewhere on my computer still. Can you please help me with this. Thank you.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 05 November 2011 - 07:57 PM

Hello and welcome. Lets run these,, if you have run something either post it's log or run again,thanks.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
  • List Minidump Files
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



Please run the tool here How to remove Google Redirects

When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.



Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 05 November 2011 - 11:23 PM

MiniToolBox result:

MiniToolBox by Farbar
Ran by Porter Family (administrator) on 05-11-2011 at 21:19:18
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= Flush DNS: ===================================


Windows IP Configuration



Successfully flushed the DNS Resolver Cache.


========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.
Hosts file not detected in the default directory
========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : porter

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : VIA Rhine II Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-50-2C-A8-21-80

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.4

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 192.168.1.1

Lease Obtained. . . . . . . . . . : Saturday, November 05, 2011 3:32:30 PM

Lease Expires . . . . . . . . . . : Sunday, November 06, 2011 3:32:30 PM

Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.227.84, 74.125.227.82, 74.125.227.80, 74.125.227.83
74.125.227.81



Pinging google.com [74.125.227.84] with 32 bytes of data:



Reply from 74.125.227.84: bytes=32 time=43ms TTL=51

Reply from 74.125.227.84: bytes=32 time=43ms TTL=51



Ping statistics for 74.125.227.84:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 43ms, Maximum = 43ms, Average = 43ms

Server: UnKnown
Address: 192.168.1.1

Name: yahoo.com
Addresses: 72.30.2.43, 98.137.149.56, 98.139.180.149, 209.191.122.70
67.195.160.76



Pinging yahoo.com [72.30.2.43] with 32 bytes of data:



Reply from 72.30.2.43: bytes=32 time=25ms TTL=52

Reply from 72.30.2.43: bytes=32 time=24ms TTL=52



Ping statistics for 72.30.2.43:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 24ms, Maximum = 25ms, Average = 24ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 50 2c a8 21 80 ...... VIA PCI 10/100Mb Fast Ethernet Adapter - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.4 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.4 192.168.1.4 20
192.168.1.0 255.255.255.0 192.168.1.4 192.168.1.4 20
192.168.1.4 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.4 192.168.1.4 20
224.0.0.0 240.0.0.0 192.168.1.4 192.168.1.4 20
255.255.255.255 255.255.255.255 192.168.1.4 192.168.1.4 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [152864] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (11/04/2011 07:54:06 PM) (Source: Lavasoft Ad-Aware Service) (User: )
Description: Only one instance of service process is allowed.

Error: (11/01/2011 04:23:54 PM) (Source: Application Error) (User: )
Description: Faulting application cli.exe, version 1.11.0.0, faulting module , version 0.0.0.0, fault address 0x00000000.
Processing media-specific event for [cli.exe!ws!]

Error: (10/27/2011 09:22:43 PM) (Source: Application Error) (User: )
Description: Faulting application cli.exe, version 1.11.0.0, faulting module , version 0.0.0.0, fault address 0x00000000.
Processing media-specific event for [cli.exe!ws!]

Error: (10/27/2011 08:26:28 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 13328

Error: (10/27/2011 08:26:28 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 13328

Error: (10/27/2011 08:26:28 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (10/27/2011 08:26:26 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 11219

Error: (10/27/2011 08:26:26 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 11219

Error: (10/27/2011 08:26:26 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (10/27/2011 08:26:23 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 8406


System errors:
=============
Error: (11/05/2011 03:32:53 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
TfFsMon
TfSysMon

Error: (11/05/2011 03:32:48 PM) (Source: Service Control Manager) (User: )
Description: The tmcomm service failed to start due to the following error:
%%2

Error: (11/04/2011 09:39:59 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
TfFsMon
TfSysMon

Error: (11/04/2011 09:39:59 PM) (Source: Service Control Manager) (User: )
Description: The tmcomm service failed to start due to the following error:
%%2

Error: (11/04/2011 09:26:29 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
TfFsMon
TfSysMon

Error: (11/04/2011 09:26:24 PM) (Source: Service Control Manager) (User: )
Description: The tmcomm service failed to start due to the following error:
%%2

Error: (11/04/2011 09:04:38 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
TfFsMon
TfSysMon

Error: (11/04/2011 09:04:38 PM) (Source: Service Control Manager) (User: )
Description: The tmcomm service failed to start due to the following error:
%%2

Error: (11/04/2011 08:53:54 PM) (Source: Service Control Manager) (User: )
Description: The Application Management service terminated with the following error:
%%126

Error: (11/04/2011 08:53:54 PM) (Source: Service Control Manager) (User: )
Description: The Application Management service terminated with the following error:
%%126


Microsoft Office Sessions:
=========================
Error: (11/04/2011 07:54:06 PM) (Source: Lavasoft Ad-Aware Service)(User: )
Description: Only one instance of service process is allowed.

Error: (11/01/2011 04:23:54 PM) (Source: Application Error)(User: )
Description: cli.exe1.11.0.00.0.0.000000000

Error: (10/27/2011 09:22:43 PM) (Source: Application Error)(User: )
Description: cli.exe1.11.0.00.0.0.000000000

Error: (10/27/2011 08:26:28 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 13328

Error: (10/27/2011 08:26:28 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledEvent 13328

Error: (10/27/2011 08:26:28 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (10/27/2011 08:26:26 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 11219

Error: (10/27/2011 08:26:26 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledEvent 11219

Error: (10/27/2011 08:26:26 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (10/27/2011 08:26:23 PM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 8406


=========================== Installed Programs ============================

Adobe Flash Player 10 ActiveX (Version: 10.0.45.2)
Adobe Flash Player 10 Plugin (Version: 10.1.82.76)
Adobe Reader 9.4.6 (Version: 9.4.6)
Adobe Shockwave Player 11.5 (Version: 11.5.7.609)
Apple Application Support (Version: 1.5.1)
Apple Mobile Device Support (Version: 3.4.0.25)
Apple Software Update (Version: 2.1.3.127)
ATI - Software Uninstall Utility (Version: 6.14.10.1014)
ATI Catalyst Control Center (Version: 1.2.2314.20337)
ATI Display Driver (Version: 8.252-060503a-038185C-ATI)
Bonjour (Version: 2.0.4.0)
C-Media WDM Audio Driver
Canon CanoScan Toolbox 4.1
Easy CD & DVD Creator 6 (Version: 6.0.0.208)
Fiddler2 (Version: 2.3.6.7)
Free File Opener version 2011.6.0 (Version: 2011.6.0)
Google Earth Plug-in (Version: 6.0.3.2197)
Google Update Helper (Version: 1.3.21.79)
GospeLink 2001
HP Deskjet 3740 (Version: 1.00.0000)
HP Software Update (Version: 3.0.1.25)
InstallVC90Support (Version: 1.01.0000)
InterActual Player
iTunes (Version: 10.2.1.1)
Java Auto Updater (Version: 2.0.2.4)
Java™ 6 Update 29 (Version: 6.0.290)
Lernout & Hauspie TruVoice American English TTS Engine
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Security Update (KB2572067)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Office Professional Edition 2003 (Version: 11.0.5614.0)
Microsoft Silverlight (Version: 4.0.60831.0)
Microsoft Text-to-Speech Engine 4.0 (English)
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570 (Version: 9.0.30729.5570)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (Version: 9.0.21022)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
MobileMe Control Panel (Version: 3.1.6.0)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
Platform (Version: 1.1)
QuickTime (Version: 7.69.80.9)
Reader Rabbit 1st Grade
Safari (Version: 5.33.21.1)
TurboTax 2010
TurboTax 2010 WinPerFedFormset (Version: 010.000.3535)
TurboTax 2010 WinPerReleaseEngine (Version: 010.000.0425)
TurboTax 2010 WinPerTaxSupport (Version: 010.000.0202)
TurboTax 2010 wrapper (Version: 010.000.0157)
TurboTax 2010 wutiper (Version: 010.000.1042)
VIA Platform Device Manager (Version: 1.1)
VIA Rhine-Family Fast-Ethernet Adapter
VoiceOver Kit (Version: 1.40.128.0)
WebFldrs XP (Version: 9.50.7523)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Media Format 11 runtime
Windows Media Player 11
Windows XP Service Pack 3 (Version: 20080414.031525)
WinZip 14.5 (Version: 14.5.9095)

========================= Memory info: ===================================

Percentage of memory in use: 45%
Total physical RAM: 1023.46 MB
Available physical RAM: 552.71 MB
Total Pagefile: 2462.16 MB
Available Pagefile: 2071.4 MB
Total Virtual: 2047.88 MB
Available Virtual: 1988.85 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:38.28 GB) (Free:1.37 GB) NTFS
2 Drive e: (RR1 Cloud) (CDROM) (Total:0.63 GB) (Free:0 GB) CDFS

========================= Users: ========================================

User accounts for \\PORTER

Administrator Guest HelpAssistant
Porter Family SUPPORT_388945a0

========================= Minidump Files ==================================

C:\WINDOWS\Minidump\Mini052011-01.dmp
C:\WINDOWS\Minidump\Mini052011-02.dmp
C:\WINDOWS\Minidump\Mini052011-03.dmp

**** End of log ****

TDSSKiller results:

21:25:09.0203 3944 TDSS rootkit removing tool 2.6.15.0 Nov 3 2011 17:15:49
21:25:09.0546 3944 ============================================================
21:25:09.0546 3944 Current date / time: 2011/11/05 21:25:09.0546
21:25:09.0546 3944 SystemInfo:
21:25:09.0546 3944
21:25:09.0546 3944 OS Version: 5.1.2600 ServicePack: 3.0
21:25:09.0546 3944 Product type: Workstation
21:25:09.0546 3944 ComputerName: PORTER
21:25:09.0546 3944 UserName: Porter Family
21:25:09.0546 3944 Windows directory: C:\WINDOWS
21:25:09.0546 3944 System windows directory: C:\WINDOWS
21:25:09.0546 3944 Processor architecture: Intel x86
21:25:09.0546 3944 Number of processors: 1
21:25:09.0546 3944 Page size: 0x1000
21:25:09.0546 3944 Boot type: Normal boot
21:25:09.0546 3944 ============================================================
21:25:12.0515 3944 Initialize success
21:25:16.0296 3868 ============================================================
21:25:16.0296 3868 Scan started
21:25:16.0296 3868 Mode: Manual;
21:25:16.0296 3868 ============================================================
21:25:19.0109 3868 Abiosdsk - ok
21:25:19.0140 3868 abp480n5 - ok
21:25:19.0203 3868 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
21:25:19.0203 3868 ACPI - ok
21:25:19.0265 3868 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
21:25:19.0265 3868 ACPIEC - ok
21:25:19.0343 3868 adpu160m - ok
21:25:19.0453 3868 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
21:25:19.0453 3868 aec - ok
21:25:19.0593 3868 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
21:25:19.0593 3868 AFD - ok
21:25:19.0671 3868 Aha154x - ok
21:25:19.0703 3868 aic78u2 - ok
21:25:19.0734 3868 aic78xx - ok
21:25:19.0781 3868 AliIde - ok
21:25:19.0843 3868 AmdK7 (8fce268cdbdd83b23419d1f35f42c7b1) C:\WINDOWS\system32\DRIVERS\amdk7.sys
21:25:19.0843 3868 AmdK7 - ok
21:25:19.0890 3868 amsint - ok
21:25:19.0953 3868 asc - ok
21:25:19.0984 3868 asc3350p - ok
21:25:20.0015 3868 asc3550 - ok
21:25:20.0093 3868 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
21:25:20.0109 3868 AsyncMac - ok
21:25:20.0156 3868 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
21:25:20.0156 3868 atapi - ok
21:25:20.0203 3868 Atdisk - ok
21:25:20.0328 3868 ati2mtag (492bd2a5f65f218d4ede5764a3bb67e9) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
21:25:20.0390 3868 ati2mtag - ok
21:25:20.0515 3868 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
21:25:20.0515 3868 Atmarpc - ok
21:25:20.0578 3868 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
21:25:20.0578 3868 audstub - ok
21:25:20.0687 3868 bcm (14196079dddd871d8ba6c406c15c3f4a) C:\WINDOWS\system32\DRIVERS\drxvi314.sys
21:25:20.0703 3868 bcm - ok
21:25:20.0796 3868 bcmbusctr (360c731bd6537c635c8d15b2f0d49669) C:\WINDOWS\system32\DRIVERS\BcmBusCtr.sys
21:25:20.0796 3868 bcmbusctr - ok
21:25:20.0859 3868 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
21:25:20.0859 3868 Beep - ok
21:25:20.0968 3868 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
21:25:20.0968 3868 cbidf2k - ok
21:25:21.0031 3868 cd20xrnt - ok
21:25:21.0078 3868 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
21:25:21.0078 3868 Cdaudio - ok
21:25:21.0156 3868 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
21:25:21.0156 3868 Cdfs - ok
21:25:21.0218 3868 Cdr4_xp (15c23060ea95cc4409910eb9e7872c01) C:\WINDOWS\system32\drivers\Cdr4_xp.sys
21:25:21.0218 3868 Cdr4_xp - ok
21:25:21.0296 3868 Cdralw2k (edd1adc3152282442e1cde9e34aa8d2e) C:\WINDOWS\system32\drivers\Cdralw2k.sys
21:25:21.0296 3868 Cdralw2k - ok
21:25:21.0406 3868 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
21:25:21.0406 3868 Cdrom - ok
21:25:21.0453 3868 Changer - ok
21:25:21.0531 3868 CmdIde - ok
21:25:21.0625 3868 cmuda (297cc8a257cbd3c46bbd675ec5e35cc2) C:\WINDOWS\system32\drivers\cmuda.sys
21:25:21.0656 3868 cmuda - ok
21:25:21.0750 3868 cm_ser (33f77f7cb2c2efe34b3bc9cc716f73f3) C:\WINDOWS\system32\DRIVERS\cm_ser.sys
21:25:21.0765 3868 cm_ser - ok
21:25:21.0812 3868 Cpqarray - ok
21:25:21.0843 3868 dac2w2k - ok
21:25:21.0890 3868 dac960nt - ok
21:25:21.0937 3868 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
21:25:21.0937 3868 Disk - ok
21:25:22.0046 3868 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
21:25:22.0078 3868 dmboot - ok
21:25:22.0156 3868 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
21:25:22.0156 3868 dmio - ok
21:25:22.0187 3868 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
21:25:22.0187 3868 dmload - ok
21:25:22.0453 3868 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
21:25:22.0546 3868 DMusic - ok
21:25:22.0750 3868 dot4 (3e4b043f8bc6be1d4820cc6c9c500306) C:\WINDOWS\system32\DRIVERS\Dot4.sys
21:25:22.0765 3868 dot4 - ok
21:25:22.0859 3868 Dot4Print (77ce63a8a34ae23d9fe4c7896d1debe7) C:\WINDOWS\system32\DRIVERS\Dot4Prt.sys
21:25:22.0859 3868 Dot4Print - ok
21:25:22.0937 3868 Dot4Scan (bd05306428da63369692477ddc0f6f5f) C:\WINDOWS\system32\DRIVERS\Dot4Scan.sys
21:25:22.0937 3868 Dot4Scan - ok
21:25:23.0015 3868 dot4usb (6ec3af6bb5b30e488a0c559921f012e1) C:\WINDOWS\system32\DRIVERS\dot4usb.sys
21:25:23.0031 3868 dot4usb - ok
21:25:23.0062 3868 dpti2o - ok
21:25:23.0109 3868 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
21:25:23.0109 3868 drmkaud - ok
21:25:23.0234 3868 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
21:25:23.0234 3868 Fastfat - ok
21:25:23.0281 3868 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
21:25:23.0281 3868 Fdc - ok
21:25:23.0359 3868 FET5X86V (92cbce0913661ff966f9fb696a1775a5) C:\WINDOWS\system32\DRIVERS\fetnd5bv.sys
21:25:23.0359 3868 FET5X86V - ok
21:25:23.0437 3868 FETNDIS (e9648254056bce81a85380c0c3647dc4) C:\WINDOWS\system32\DRIVERS\fetnd5.sys
21:25:23.0437 3868 FETNDIS - ok
21:25:23.0531 3868 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
21:25:23.0531 3868 Fips - ok
21:25:23.0578 3868 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
21:25:23.0578 3868 Flpydisk - ok
21:25:23.0640 3868 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
21:25:23.0640 3868 FltMgr - ok
21:25:23.0718 3868 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
21:25:23.0718 3868 Fs_Rec - ok
21:25:23.0796 3868 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
21:25:23.0796 3868 Ftdisk - ok
21:25:23.0875 3868 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
21:25:23.0875 3868 GEARAspiWDM - ok
21:25:23.0953 3868 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
21:25:23.0953 3868 Gpc - ok
21:25:24.0062 3868 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
21:25:24.0062 3868 hidusb - ok
21:25:24.0109 3868 hpn - ok
21:25:24.0187 3868 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
21:25:24.0203 3868 HTTP - ok
21:25:24.0265 3868 i2omgmt - ok
21:25:24.0296 3868 i2omp - ok
21:25:24.0500 3868 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
21:25:24.0500 3868 i8042prt - ok
21:25:24.0562 3868 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
21:25:24.0562 3868 Imapi - ok
21:25:24.0609 3868 ini910u - ok
21:25:24.0671 3868 IntelIde - ok
21:25:24.0750 3868 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
21:25:24.0750 3868 Ip6Fw - ok
21:25:24.0843 3868 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
21:25:24.0843 3868 IpFilterDriver - ok
21:25:24.0921 3868 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
21:25:24.0921 3868 IpInIp - ok
21:25:24.0984 3868 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
21:25:25.0000 3868 IpNat - ok
21:25:25.0046 3868 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
21:25:25.0046 3868 IPSec - ok
21:25:25.0093 3868 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
21:25:25.0093 3868 IRENUM - ok
21:25:25.0156 3868 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
21:25:25.0156 3868 isapnp - ok
21:25:25.0234 3868 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
21:25:25.0234 3868 Kbdclass - ok
21:25:25.0312 3868 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
21:25:25.0312 3868 kbdhid - ok
21:25:25.0390 3868 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
21:25:25.0406 3868 kmixer - ok
21:25:25.0468 3868 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
21:25:25.0484 3868 KSecDD - ok
21:25:25.0562 3868 Lavasoft Kernexplorer - ok
21:25:25.0640 3868 lbrtfdc - ok
21:25:25.0734 3868 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
21:25:25.0734 3868 mnmdd - ok
21:25:25.0828 3868 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
21:25:25.0828 3868 Modem - ok
21:25:25.0890 3868 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
21:25:25.0890 3868 Mouclass - ok
21:25:25.0968 3868 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
21:25:25.0968 3868 mouhid - ok
21:25:26.0031 3868 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
21:25:26.0031 3868 MountMgr - ok
21:25:26.0078 3868 mraid35x - ok
21:25:26.0140 3868 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
21:25:26.0156 3868 MRxDAV - ok
21:25:26.0234 3868 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
21:25:26.0265 3868 MRxSmb - ok
21:25:26.0359 3868 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
21:25:26.0359 3868 Msfs - ok
21:25:26.0453 3868 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
21:25:26.0453 3868 MSKSSRV - ok
21:25:26.0546 3868 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
21:25:26.0546 3868 MSPCLOCK - ok
21:25:26.0625 3868 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
21:25:26.0625 3868 MSPQM - ok
21:25:26.0718 3868 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
21:25:26.0718 3868 mssmbios - ok
21:25:26.0781 3868 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
21:25:26.0781 3868 Mup - ok
21:25:26.0875 3868 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
21:25:26.0875 3868 NDIS - ok
21:25:26.0953 3868 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
21:25:26.0953 3868 NdisTapi - ok
21:25:27.0031 3868 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
21:25:27.0031 3868 Ndisuio - ok
21:25:27.0109 3868 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
21:25:27.0109 3868 NdisWan - ok
21:25:27.0203 3868 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
21:25:27.0203 3868 NDProxy - ok
21:25:27.0296 3868 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
21:25:27.0296 3868 NetBIOS - ok
21:25:27.0390 3868 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
21:25:27.0406 3868 NetBT - ok
21:25:27.0500 3868 Nmea - ok
21:25:27.0562 3868 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
21:25:27.0562 3868 Npfs - ok
21:25:27.0656 3868 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
21:25:27.0671 3868 Ntfs - ok
21:25:27.0765 3868 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
21:25:27.0765 3868 Null - ok
21:25:27.0828 3868 NWADI (93213c7ec08e01e37a935bf144e75df6) C:\WINDOWS\system32\DRIVERS\NWADIenum.sys
21:25:27.0843 3868 NWADI - ok
21:25:27.0906 3868 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
21:25:27.0906 3868 NwlnkFlt - ok
21:25:27.0968 3868 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
21:25:27.0968 3868 NwlnkFwd - ok
21:25:28.0031 3868 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
21:25:28.0046 3868 Parport - ok
21:25:28.0125 3868 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
21:25:28.0125 3868 PartMgr - ok
21:25:28.0203 3868 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
21:25:28.0203 3868 ParVdm - ok
21:25:28.0265 3868 PCASp50 (1961590aa191b6b7dcf18a6a693af7b8) C:\WINDOWS\system32\Drivers\PCASp50.sys
21:25:28.0265 3868 PCASp50 - ok
21:25:28.0359 3868 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
21:25:28.0359 3868 PCI - ok
21:25:28.0390 3868 PCIDump - ok
21:25:28.0437 3868 PCIIde - ok
21:25:28.0500 3868 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
21:25:28.0500 3868 Pcmcia - ok
21:25:28.0546 3868 PCTINDIS5 - ok
21:25:28.0593 3868 PDCOMP - ok
21:25:28.0640 3868 PDFRAME - ok
21:25:28.0671 3868 PDRELI - ok
21:25:28.0718 3868 PDRFRAME - ok
21:25:28.0765 3868 perc2 - ok
21:25:28.0796 3868 perc2hib - ok
21:25:28.0906 3868 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
21:25:28.0906 3868 PptpMiniport - ok
21:25:29.0015 3868 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
21:25:29.0015 3868 PSched - ok
21:25:29.0125 3868 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
21:25:29.0125 3868 Ptilink - ok
21:25:29.0203 3868 ql1080 - ok
21:25:29.0234 3868 Ql10wnt - ok
21:25:29.0281 3868 ql12160 - ok
21:25:29.0328 3868 ql1240 - ok
21:25:29.0375 3868 ql1280 - ok
21:25:29.0546 3868 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
21:25:29.0546 3868 RasAcd - ok
21:25:29.0687 3868 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
21:25:29.0687 3868 Rasl2tp - ok
21:25:29.0812 3868 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
21:25:29.0812 3868 RasPppoe - ok
21:25:29.0906 3868 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
21:25:29.0906 3868 Raspti - ok
21:25:30.0000 3868 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
21:25:30.0000 3868 Rdbss - ok
21:25:30.0093 3868 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
21:25:30.0093 3868 RDPCDD - ok
21:25:30.0187 3868 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
21:25:30.0187 3868 RDPWD - ok
21:25:30.0250 3868 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
21:25:30.0250 3868 redbook - ok
21:25:30.0343 3868 RimVSerPort (d9b34325ee5df78b8f28a3de9f577c7d) C:\WINDOWS\system32\DRIVERS\RimSerial.sys
21:25:30.0343 3868 RimVSerPort - ok
21:25:30.0437 3868 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) C:\WINDOWS\system32\Drivers\RootMdm.sys
21:25:30.0437 3868 ROOTMODEM - ok
21:25:30.0593 3868 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
21:25:30.0593 3868 Secdrv - ok
21:25:30.0687 3868 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
21:25:30.0687 3868 serenum - ok
21:25:30.0796 3868 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
21:25:30.0796 3868 Sfloppy - ok
21:25:30.0843 3868 Simbad - ok
21:25:30.0890 3868 Sparrow - ok
21:25:30.0937 3868 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
21:25:30.0937 3868 splitter - ok
21:25:31.0031 3868 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
21:25:31.0031 3868 sr - ok
21:25:31.0109 3868 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
21:25:31.0125 3868 Srv - ok
21:25:31.0234 3868 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
21:25:31.0234 3868 swenum - ok
21:25:31.0312 3868 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
21:25:31.0312 3868 swmidi - ok
21:25:31.0406 3868 swmsflt (150ab4fa272130ec55b2a4faebdf47f9) C:\WINDOWS\System32\drivers\swmsflt.sys
21:25:31.0406 3868 swmsflt - ok
21:25:31.0468 3868 symc810 - ok
21:25:31.0500 3868 symc8xx - ok
21:25:31.0531 3868 sym_hi - ok
21:25:31.0562 3868 sym_u3 - ok
21:25:31.0625 3868 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
21:25:31.0625 3868 sysaudio - ok
21:25:31.0734 3868 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
21:25:31.0750 3868 Tcpip - ok
21:25:31.0843 3868 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
21:25:31.0843 3868 TDPIPE - ok
21:25:31.0906 3868 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
21:25:31.0921 3868 TDTCP - ok
21:25:31.0968 3868 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
21:25:31.0968 3868 TermDD - ok
21:25:32.0031 3868 TfFsMon - ok
21:25:32.0062 3868 TfNetMon - ok
21:25:32.0093 3868 TfSysMon - ok
21:25:32.0140 3868 tmcomm - ok
21:25:32.0171 3868 TosIde - ok
21:25:32.0250 3868 uagp35 (d85938f272d1bcf3db3a31fc0a048928) C:\WINDOWS\system32\DRIVERS\uagp35.sys
21:25:32.0250 3868 uagp35 - ok
21:25:32.0296 3868 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
21:25:32.0312 3868 Udfs - ok
21:25:32.0359 3868 ultra - ok
21:25:32.0437 3868 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
21:25:32.0515 3868 Update - ok
21:25:32.0671 3868 USBAAPL (d4fb6ecc60a428564ba8768b0e23c0fc) C:\WINDOWS\system32\Drivers\usbaapl.sys
21:25:32.0671 3868 USBAAPL - ok
21:25:32.0718 3868 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
21:25:32.0718 3868 usbccgp - ok
21:25:32.0812 3868 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
21:25:32.0812 3868 usbehci - ok
21:25:32.0875 3868 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
21:25:32.0875 3868 usbhub - ok
21:25:32.0953 3868 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
21:25:32.0953 3868 usbprint - ok
21:25:33.0031 3868 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
21:25:33.0031 3868 usbscan - ok
21:25:33.0109 3868 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
21:25:33.0125 3868 USBSTOR - ok
21:25:33.0187 3868 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
21:25:33.0187 3868 usbuhci - ok
21:25:33.0234 3868 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
21:25:33.0234 3868 VgaSave - ok
21:25:33.0281 3868 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) C:\WINDOWS\system32\DRIVERS\viaide.sys
21:25:33.0281 3868 ViaIde - ok
21:25:33.0343 3868 viamraid (65864aba65eee06ea586009301834e43) C:\WINDOWS\system32\DRIVERS\viamraid.sys
21:25:33.0343 3868 viamraid - ok
21:25:33.0437 3868 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
21:25:33.0437 3868 VolSnap - ok
21:25:33.0500 3868 Vsp - ok
21:25:33.0578 3868 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
21:25:33.0578 3868 Wanarp - ok
21:25:33.0640 3868 WDICA - ok
21:25:33.0703 3868 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
21:25:33.0703 3868 wdmaud - ok
21:25:33.0859 3868 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
21:25:33.0859 3868 WS2IFSL - ok
21:25:33.0953 3868 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
21:25:33.0953 3868 WudfPf - ok
21:25:34.0015 3868 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
21:25:34.0015 3868 WudfRd - ok
21:25:34.0078 3868 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
21:25:34.0171 3868 \Device\Harddisk0\DR0 - ok
21:25:34.0187 3868 Boot (0x1200) (aa67595390f4669c53567b1bf9c45116) \Device\Harddisk0\DR0\Partition0
21:25:34.0187 3868 \Device\Harddisk0\DR0\Partition0 - ok
21:25:34.0187 3868 ============================================================
21:25:34.0187 3868 Scan finished
21:25:34.0187 3868 ============================================================
21:25:34.0218 2204 Detected object count: 0
21:25:34.0218 2204 Actual detected object count: 0
21:25:58.0093 1044 Deinitialize success

Malwarebytes result:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8095

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

11/5/2011 9:52:13 PM
mbam-log-2011-11-05 (21-52-13).txt

Scan type: Quick scan
Objects scanned: 188276
Time elapsed: 10 minute(s), 33 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*debugcryptauto.exe (Trojan.FakeAlert) -> Value: *debugcryptauto.exe -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\localservice\local settings\application data\debugcryptauto.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 06 November 2011 - 12:25 PM

Are you on a router? Are other machines on it,if so are they redirecting?

Do you use Firefox?
Let me know if you are still redirecting.

Your HOSTS file may be infected.
Reset the HOSTS file
As this infection also changes your Windows HOSTS file, we want to replace this file with the default version for your operating system.
Some types of malware will alter the HOSTS file as part of its infection. Please follow the instructions provided in How do I reset the hosts file back to the default?

To reset the hosts file automatically,go HERE click the Posted Image button. Then just follow the prompts in the Fix it wizard.


OR
Click Run in the File Download dialog box or save MicrosoftFixit50267.msi to your Desktop and double-click on it to run. Then just follow the promots in the Fix it wizard.



I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 06 November 2011 - 10:11 PM

I am on a router. The other computer on the router is NOT experiencing the redirect. I was using Firefox until a few days ago. A friend of mine was trying to help me and he downloaded Chrome and deleted Firefox. I just downloaded it again. It was performing a little better. I worked on the hosts file. I only had a lmhosts.sam file. So, I created a hosts file with the appropriate info in it. I tried Firefox again. It stopped redirecting. But, sometimes it would not bring up websites. I also get a message about encryption on certain sites(You have requested an encrypted page that contains some unencrypted information. Information that you see or enter on this page could easily be read by a third party.). After using the ESET tool, I didn't have any problem bringing up any sites. I did get one redirect and one case where it sent me to Facebook instead of the link. I also am still getting the encryption message on certain sites. Thank you again for your continued assistance. Here is the results from the ESET tool.

C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\c5mwj474.default\extensions\{5a47d8b5-a603-477f-ba09-3cee3b011e13}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\c5mwj474.default\extensions\{5a47d8b5-a603-477f-ba09-3cee3b011e13}\chrome\xulcache.jar JS/Agent.NDJ trojan deleted - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\40\6e64c1a8-5276c5fe multiple threats deleted - quarantined
C:\Documents and Settings\Porter Family\Local Settings\Temp\ICReinstall\cnet_HitmanPro35_exe.exe a variant of Win32/InstallCore.D application cleaned by deleting - quarantined
C:\Documents and Settings\Porter Family\Local Settings\Temp\is1598539481\zgInstaller.exe a variant of Win32/Toolbar.Zugo application deleted - quarantined
C:\RECYCLER\S-1-5-21-1060284298-113007714-839522115-1004\Dc1\enemies-names.txt Win32/Adware.AntimalwareDoctor.AE.Gen application cleaned by deleting - quarantined
C:\RECYCLER\S-1-5-21-1060284298-113007714-839522115-1004\Dc1\local.ini Win32/Adware.AntimalwareDoctor.AE.Gen application cleaned by deleting - quarantined
C:\WINDOWS\system32\authdnsmgr.exe a variant of Win32/Kryptik.UPC trojan cleaned by deleting - quarantined
Operating memory probably a variant of Win32/Spy.Agent.NSY trojan

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 07 November 2011 - 12:44 PM

How are the redirects.. ??

When a browser runs an applet, the Java Runtime Environment (JRE) stores the downloaded files into its cache folder (C:\Documents and Settings\username\Application Data\Sun\Java\Deployment\cache) for quick execution later and better performance. Malicious applets are also stored in the Java cache directory and your anti-virus may detect them and provide alerts. For more specific information about Java exploits, please refer to Virus found in the Java cache directory.

Notification of these files as a threat does not always mean that a machine has been infected; it indicates that a program included the viral class file but this does not mean that it used the malicious functionality. As a precaution, I recommend clearing the entire cache to ensure everything is cleaned out:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 07 November 2011 - 02:31 PM

I cleaned everything out. Unfortunately, I'm still getting redirects :(

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 07 November 2011 - 02:46 PM

Let's check for and confirm an MBR (Master Boot Record) rootkit.


Please download mbr.exe and save it to the root directory, usually C:\ <- (Important!).
  • Go to Start > Run and type: cmd.exe
  • press Ok.
  • At the command prompt type: c:\mbr.exe >>"C:\mbr.log"
  • press Enter.
  • The process is automatic...a black DOS window will open and quickly disappear. This is normal.
  • A log file named mbr.log will be created and saved to the root of the system drive (usually C:\).
  • Copy and paste the results of the mbr.log in your next reply.
If you have a problem using the command prompt, you can just double-click on mbr.exe to run the tool.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 07 November 2011 - 05:41 PM

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: Maxtor_6E040L0 rev.NAR61590 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK

I ran Malwarebytes again and it had more viruses to remove.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 07 November 2011 - 09:32 PM

Ok, that looks good. Did you run a Full scan this time?
Post what it found.
•The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.

•Copy and paste the contents of that report in your next reply.


If using FireFox it may be the Add ons/Plugins. try disabling them one at a time and see which one was at fault.

How to disable extensions and plugins

Keeping your third-party plugins up to date




If still redirecting>>>
Change your DNS Servers:
  • Go to Posted Image > Run... and in the open box, type: cmd
  • Press OK or Hit Enter.
  • At the command prompt, type or copy/paste: ipconfig /flushdns
  • Hit Enter.
  • You will get a confirmation that the flush was successful.
  • Close the command box.
If the above commands did not resolve the problem, the next thing to try is to reset your network settings and Configure TCP/IP to use DNS.
  • Go to Posted Image > Control Panel, and choose Network Connections.
  • Right-click on your default connection, usually Local Area Connection or Dial-up Connection if you are using Dial-up, and and choose Properties.
  • Double-click on Internet Protocol (TCP/IP) or highlight it and select Properties.
  • Under the General tab, write down any settings in case you should need to change them back.
  • Select the button that says "Obtain an IP address automatically" or make sure the DNS server IP address is the same as provided by your ISP.
  • Select the button that says "Obtain DNS servers automatically".
  • If unknown Preferred or Alternate DNS servers are listed, uncheck the box that says "Use the following DNS server address".
  • Click OK twice to get out of the properties screen and restart your computer. If not prompted to reboot go ahead and reboot manually.
-- Vista users can refer to How to Change TCP/IP settings

CAUTION: It's possible that your ISP (Internet Service Provider) requires specific DNS settings here. Make sure you know if you need these settings or not BEFORE you make any changes or you may lose your Internet connection. If you're sure you do not need a specific DNS address,
then you may proceed.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 07 November 2011 - 10:44 PM

I disabled all of the plug-ins and extensions in Firefox. I flushed the DNS server. And I configured the IP. Still getting redirects. To be accurate, it is performing better than when we started. I used to get redirects with every link. Now it is every fifth or sixth. And if it does redirect, I can back page and try again and it works. I did do a FULL scan with Malwarebytes. The result is below. It seems like over the course of the problem, every time I have used a different anti-virus software it finds viruses. Even when I use the same software a second or third time.

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8101

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

11/7/2011 1:36:12 PM
mbam-log-2011-11-07 (13-36-12).txt

Scan type: Full scan (C:\|)
Objects scanned: 239254
Time elapsed: 54 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*bridgemgramd.exe (Trojan.FakeAlert) -> Value: *bridgemgramd.exe -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\all users\application data\bridgemgramd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{d7fa2e9c-c53e-438d-b1d8-8b97d80cd866}\RP14\A0006553.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{d7fa2e9c-c53e-438d-b1d8-8b97d80cd866}\RP8\A0006118.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 07 November 2011 - 11:02 PM

Ok, one more time ....:)

Reboot into Safe Mode with Networking
How to enter safe mode(XP/Vista)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode with Networking using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.


>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.

Run RKill....

Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.



Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.

Edited by boopme, 07 November 2011 - 11:03 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 08 November 2011 - 03:36 PM

I ran Fix.exe, RKill and Superantispyware in Safe Mode. I rebooted. Then I ran Malwarebytes. The results are below. Malwarebytes found the same two viruses I removed yesterday. After that, I also tried some searching on Google. It was worse than it has been in the last few days :( Sorry to keep reporting bad news.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 11/08/2011 at 12:49 PM

Application Version : 5.0.1134

Core Rules Database Version : 7912
Trace Rules Database Version: 5724

Scan type : Complete Scan
Total Scan Time : 00:59:16

Operating System Information
Windows XP Home Edition 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 261
Memory threats detected : 0
Registry items scanned : 36096
Registry threats detected : 6
File items scanned : 68257
File threats detected : 242

Trojan.Agent/Gen-FraudScan[Prod]
[authaudioedit.exe] C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\AUTHAUDIOEDIT.EXE
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\AUTHAUDIOEDIT.EXE
[queueadmaction.exe] C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\START MENU\PROGRAMS\QUEUEADMACTION.EXE
C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\START MENU\PROGRAMS\QUEUEADMACTION.EXE
[authaudioedit.exe] C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\AUTHAUDIOEDIT.EXE
[queueadmaction.exe] C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\START MENU\PROGRAMS\QUEUEADMACTION.EXE
[authaudioedit.exe] C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\AUTHAUDIOEDIT.EXE
[*authaudioedit.exe] C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\AUTHAUDIOEDIT.EXE

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\CAF739GW.txt [ /lucidmedia.com ]
C:\Documents and Settings\Administrator\Cookies\CAMZGLAV.txt [ /ads.undertone.com ]
C:\Documents and Settings\Administrator\Cookies\CA2NO5QJ.txt [ /stopzilla.com ]
C:\Documents and Settings\Administrator\Cookies\CAEZGLIN.txt [ /www.stopzilla.com ]
C:\Documents and Settings\Administrator\Cookies\CABDON9X.txt [ /liveperson.net ]
C:\Documents and Settings\Administrator\Cookies\CA23XJDE.txt [ /liveperson.net ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAKLEVC1.txt [ Cookie:system@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAINOLER.txt [ Cookie:system@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAP37U6Z.txt [ Cookie:system@www.burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAEFTQJM.txt [ Cookie:system@dc.tremormedia.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAJW9BNO.txt [ Cookie:system@tacoda.at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CASPQBOD.txt [ Cookie:system@myroitracking.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAIBC5UZ.txt [ Cookie:system@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAEZE1M9.txt [ Cookie:system@ar.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CARTXV1R.txt [ Cookie:system@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAFA90MG.txt [ Cookie:system@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAOD1IGY.txt [ Cookie:system@akamai.interclickproxy.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAISY4YM.txt [ Cookie:system@www.pornhub.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAOIQYFE.txt [ Cookie:system@www.omgtracking.info/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA2E42IN.txt [ Cookie:system@lucidmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAKD63YF.txt [ Cookie:system@clicks.thespecialsearch.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAM9S76J.txt [ Cookie:system@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAPFB2I1.txt [ Cookie:system@c.gigcount.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CASDMJG5.txt [ Cookie:system@sexinfobank.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA4X272X.txt [ Cookie:system@amazon-adsystem.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAWH2L3C.txt [ Cookie:system@burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA2BPABU.txt [ Cookie:system@adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA2LWZEP.txt [ Cookie:system@www.findstuffforme.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA4V6XSR.txt [ Cookie:system@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAW5YRKX.txt [ Cookie:system@pubmatic.com/AdServer/AdClickTrackerServlet/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAGD6FK5.txt [ Cookie:system@crackle.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAIN4DYV.txt [ Cookie:system@entrepreneur.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA8H8J91.txt [ Cookie:system@bizzclick.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CANYY9F3.txt [ Cookie:system@search.clickcheer.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAVYSBJH.txt [ Cookie:system@search.amazeclick.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CANIUTZR.txt [ Cookie:system@content.yieldmanager.com/ak/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA8DQ3S9.txt [ Cookie:system@clicksor.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CABCEFBU.txt [ Cookie:system@cdn.jemamedia.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CACLY70X.txt [ Cookie:system@mm.chitika.net/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CACRYDQ5.txt [ Cookie:system@findology.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA2ZKHYN.txt [ Cookie:system@google-stats.in/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAUZOPWL.txt [ Cookie:system@ads.zeusclicks.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CATRR1J1.txt [ Cookie:system@goodcholesterolcount.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CAEZGWHD.txt [ Cookie:system@aim4media.com/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA6PG3W1.txt [ Cookie:system@adup.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CATR2T3R.txt [ Cookie:system@filter.plusfind.net/ ]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\Cookies\CA45UXTE.txt [ Cookie:system@content.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAADW98P.txt [ Cookie:system@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA23HJ9U.txt [ Cookie:system@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAS90RP1.txt [ Cookie:system@www.burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAJ8L9J0.txt [ Cookie:system@geltmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAC9QZKL.txt [ Cookie:system@tacoda.at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA2RKPI7.txt [ Cookie:system@myroitracking.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA63WHXP.txt [ Cookie:system@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CADOXVAZ.txt [ Cookie:system@ar.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAIRCTAV.txt [ Cookie:system@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAKGENC8.txt [ Cookie:system@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA98NQBN.txt [ Cookie:system@clicks.geltmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA8NUN8D.txt [ Cookie:system@marchex.bafind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAARHS5N.txt [ Cookie:system@eyewonder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA8XAZ0T.txt [ Cookie:system@lucidmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA8FYV6U.txt [ Cookie:system@clicks.thespecialsearch.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA2PG36P.txt [ Cookie:system@shop.crackberry.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAN28VND.txt [ Cookie:system@search.clicksthe.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CACDAJ0D.txt [ Cookie:system@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAC3NU2Y.txt [ Cookie:system@sexinfobank.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA0T63WX.txt [ Cookie:system@mediatraffic.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAKLYZ81.txt [ Cookie:system@www.burstbeacon.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA56RNXF.txt [ Cookie:system@burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA2P8989.txt [ Cookie:system@www.apartmentfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAUH4RUH.txt [ Cookie:system@yieldmanager.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAG9S5WV.txt [ Cookie:system@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA09E1LQ.txt [ Cookie:system@search.hippofind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAELQL8T.txt [ Cookie:system@bizzclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAEJ2YPJ.txt [ Cookie:system@server.cpmstar.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAXKPUIC.txt [ Cookie:system@mediaservices-d.openxenterprise.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAOXIF81.txt [ Cookie:system@clicksor.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAID9WWK.txt [ Cookie:system@mm.chitika.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAOTIJWP.txt [ Cookie:system@findology.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CADR717H.txt [ Cookie:system@google-stats.in/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA67XIFM.txt [ Cookie:system@www.findallofitsite.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAN6KBN9.txt [ Cookie:system@search.clickbowl.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAU78D47.txt [ Cookie:system@dc.tremormedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAYN0ZL6.txt [ Cookie:system@dlxclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAKTU3C7.txt [ Cookie:system@www.mediatraffic.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAOZRFY8.txt [ Cookie:system@www.online-direct.net/advertising/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA8XT57W.txt [ Cookie:system@findvermont.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAGSXXFE.txt [ Cookie:system@bridge1.admarketplace.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAQV2FY9.txt [ Cookie:system@apartmentfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAWBQZWJ.txt [ Cookie:system@adinterax.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAUJG5MF.txt [ Cookie:system@search.clicksare.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CASDE7KJ.txt [ Cookie:system@stats.ilivid.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAD8O3TT.txt [ Cookie:system@search.321findit.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAE94FWZ.txt [ Cookie:system@travel.aol.com/discount-travel/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA2FOL2N.txt [ Cookie:system@burstbeacon.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA3Y589Z.txt [ Cookie:system@search.findsmy.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA0FCLSF.txt [ Cookie:system@gsimedia.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA0ZOXWV.txt [ Cookie:system@martiniadnetwork.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAHRVZMF.txt [ Cookie:system@www.online-direct.net/advertising/Essential-Elements-of-Perfect-Label-Stickers_127546/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAFEA1VJ.txt [ Cookie:system@search.toseeking.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA4VIPIF.txt [ Cookie:system@www.findstuffforme.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAYBSJB8.txt [ Cookie:system@search.boltfind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAMV0PUZ.txt [ Cookie:system@filter.plusfind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAOL4VFT.txt [ Cookie:system@search.amazeclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAK9RKO4.txt [ Cookie:system@click.scour.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAS9MTXE.txt [ Cookie:system@search.clicksclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAMV8NN8.txt [ Cookie:system@xml.trafficengine.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA0LE74T.txt [ Cookie:system@trafficflatrate.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAAB49EZ.txt [ Cookie:system@cdn.jemamedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA0PMJKL.txt [ Cookie:system@content.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAUW7DOY.txt [ Cookie:system@www.trackimizer.com/bd5af7cd922fd2603be4ee3dc43b0b77/W4/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA0GS2AO.txt [ Cookie:system@getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CAYZ5NIH.txt [ Cookie:system@static.getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CA2VHAMI.txt [ Cookie:system@new.findwebresults.com/ ]
.stopzilla.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.stopzilla.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
click.scour.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
bridge2.admarketplace.net [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.admarketplace.net [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.redirect.trafficz.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
track.prd1.netshelter.net [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\C5MWJ474.DEFAULT\COOKIES.SQLITE ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
media.mtvnservices.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
media.scanscout.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
media.whosay.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
secure-uk.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XG7M8JJA ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
cdn.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
media.scanscout.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
secure-uk.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\QY6YXPS2 ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.yieldmanager.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.akamai.interclickproxy.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.specificclick.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.lucidmedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.www.burstnet.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
www.burstnet.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
bridge1.admarketplace.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.admarketplace.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.ar.atwola.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.kontera.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.getclicky.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.static.getclicky.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
in.getclicky.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.advertise.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.h.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.h.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.h.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.h.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
track.prd1.netshelter.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\JDRW88ON.DEFAULT\COOKIES.SQLITE ]



Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8118

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

11/8/2011 1:14:58 PM
mbam-log-2011-11-08 (13-14-58).txt

Scan type: Quick scan
Objects scanned: 187074
Time elapsed: 10 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*proxyeditstream.exe (Trojan.FakeAlert) -> Value: *proxyeditstream.exe -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\administrator\start menu\Programs\proxyeditstream.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 08 November 2011 - 11:16 PM

Do you play Online poker?

Lets' upload these files for a second opinion on what they actually are..
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\APPLICATION DATA\AUTHAUDIOEDIT.EXE

C:\DOCUMENTS AND SETTINGS\PORTER FAMILY\START MENU\PROGRAMS\QUEUEADMACTION.EXE

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:
How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.
<filepath>suspect.file

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/



Your HOSTS file may be infected.
Reset the HOSTS file
As this infection also changes your Windows HOSTS file, we want to replace this file with the default version for your operating system.
Some types of malware will alter the HOSTS file as part of its infection. Please follow the instructions provided in How do I reset the hosts file back to the default?

To reset the hosts file automatically,go HERE click the Posted Image button. Then just follow the prompts in the Fix it wizard.


OR
Click Run in the File Download dialog box or save MicrosoftFixit50267.msi to your Desktop and double-click on it to run. Then just follow the promots in the Fix it wizard.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 benstrashaccount

benstrashaccount
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:07:09 AM

Posted 09 November 2011 - 12:54 AM

No online poker. Why? Should I start? ;) I already had recently changed my settings to see all hidden folders. I checked it again just to be sure. But I can't find those two files anywhere. Regarding the hosts file. I didn't have one before, so I set one up in one of our earlier steps. I checked and it hasn't changed from the default.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users