Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

AV Protection 2011 / Trojan


  • Please log in to reply
19 replies to this topic

#1 dlegg0387

dlegg0387

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 21 November 2011 - 05:46 PM

Hello, I to have fallen victim to the AV Protection bug... I've done the tutorial (ran Rkill, Malware bytes, TDSKiller, and AVG)..... when I orginally got this badboy i ran malwarebytes first to remove things, then did the removal procedures per this sites instructions... Rkill (i think it ran... when i clicked to open it, i got 3 dialog boxes that opened saying application failed) eventually though, the command prompt lookin screne came up, ran for about a minute or two and a log came up in notepad--- the log had nothing in it (so far as processes ended while running Rkill)...> TDSkiller also found nothing (maybe originally it did when I ran the scan before doing the step by step instructions of this site).... However, i run AVG and still get

Object Name C:\Window\System32\consrv.dll
detection name Trojan horse Generic_r.JU
object type file
SDK type core
resulted infected


it tells me if i force remove, then my computer may be infected--- is this part of the AV protection, is it separate--- (i seem to not have any Av protection issues-- i.e. google redirects or fake virus pop ups (anymore at least)

all help greatly appreciated--- I have exams coming up and would like to spend as little time on this as possible and have considered just taking it to a place and biting the bullet and have them fix it ... thanks for any help

BC AdBot (Login to Remove)

 


#2 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 23 November 2011 - 02:33 PM

Hi dlegg0387,

:welcome: to Bleeping Computer.

My name is Jason and I'll be helping you with your computer problems. You can call me by my screename jntkwx or Jason is fine.

Some things to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please do not attach logs or put logs in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can also help.
  • Do not run anything while running a fix.
  • If you don't understand a step, please ask for clarification before continuing with any future steps.

Click on the Watch Topic button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Note to others: The instructions here are intended for the person who began this topic. If you need help, please create your own topic in the appropriate forum.

 

:step1: Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer Log Errors
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go . Please put code boxes around just this entire log, like this, but without the letter x: [xcode] MiniToolBox log [/xcode]

:step2: Let's a file for a second opinion on what it actually is.

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:
How to see hidden files in Windows

Virustotal: http://www.virustotal.com/

When the Virustotal page has finished loading, click the Choose File button and navigate to the following file and click Send File.

C:\Window\System32\consrv.dll

If prompted to reanalyze a file, please do so.

Please post back the website address (URL) of the Virustotal result in your next post.

:step3: Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

In your next reply, please include:
  • MiniToolBox log
  • Virustotal URL
  • GMER log

Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#3 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 23 November 2011 - 08:32 PM

MiniToolBox by Farbar 
Ran by Drew (administrator) on 23-11-2011 at 20:07:32
Windows 7 Home Premium  (X64)

***************************************************************************

========================= IE Proxy Settings: ============================== 

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ============================== 

========================= Hosts content: =================================


========================= IP Configuration: ================================

Atheros AR9285 Wireless Network Adapter = Wireless Network Connection (Connected)
Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller = Local Area Connection (Media disconnected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

   Host Name . . . . . . . . . . . . : Drew-PC
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : law.stetson.edu

Ethernet adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : law.stetson.edu
   Description . . . . . . . . . . . : Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller
   Physical Address. . . . . . . . . : E0-CB-4E-A2-AE-14
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . : law.stetson.edu
   Description . . . . . . . . . . . : Atheros AR9285 Wireless Network Adapter
   Physical Address. . . . . . . . . : 1C-4B-D6-58-C6-E3
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::903b:3558:e134:9090%11(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.100.26.64(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Wednesday, November 23, 2011 11:25:19 AM
   Lease Expires . . . . . . . . . . : Thursday, November 24, 2011 3:03:14 AM
   Default Gateway . . . . . . . . . : 10.100.26.1
   DHCP Server . . . . . . . . . . . : 10.100.1.124
   DHCPv6 IAID . . . . . . . . . . . : 236735446
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-12-F6-89-20-1C-4B-D6-58-C6-E3
   DNS Servers . . . . . . . . . . . : 10.100.1.124
                                       10.100.1.125
   Primary WINS Server . . . . . . . : 10.100.1.125
   Secondary WINS Server . . . . . . : 10.100.1.124
   NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.law.stetson.edu:

   Connection-specific DNS Suffix  . : law.stetson.edu
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2002:434f:aad4:8000:0:5efe:10.100.26.64(Preferred) 
   Link-local IPv6 Address . . . . . : fe80::5efe:10.100.26.64%17(Preferred) 
   Default Gateway . . . . . . . . . : fe80::5efe:10.100.45.8%17
   DNS Servers . . . . . . . . . . . : 10.100.1.124
                                       10.100.1.125
   NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter 6TO4 Adapter:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft 6to4 Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Teredo Tunneling Pseudo-Interface:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Reusable Microsoft 6To4 Adapter:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft 6to4 Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  gpdc04.law.stetson.edu
Address:  10.100.1.124

Name:    google.com
Addresses:  74.125.47.99
	  74.125.47.105
	  74.125.47.103
	  74.125.47.106
	  74.125.47.104
	  74.125.47.147


Pinging google.com [74.125.47.99] with 32 bytes of data:
Request timed out.
Request timed out.

Ping statistics for 74.125.47.99:
    Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),
Server:  gpdc04.law.stetson.edu
Address:  10.100.1.124

Name:    yahoo.com
Addresses:  98.137.149.56
	  98.139.180.149
	  209.191.122.70
	  72.30.2.43


Pinging yahoo.com [98.137.149.56] with 32 bytes of data:
Request timed out.
Request timed out.

Ping statistics for 98.137.149.56:
    Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
 12...e0 cb 4e a2 ae 14 ......Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller
 11...1c 4b d6 58 c6 e3 ......Atheros AR9285 Wireless Network Adapter
  1...........................Software Loopback Interface 1
 17...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
 14...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
 13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
 15...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #2
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      10.100.26.1     10.100.26.64     25
      10.100.26.0    255.255.255.0         On-link      10.100.26.64    281
     10.100.26.64  255.255.255.255         On-link      10.100.26.64    281
    10.100.26.255  255.255.255.255         On-link      10.100.26.64    281
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link      10.100.26.64    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link      10.100.26.64    281
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 17    286 ::/0                     fe80::5efe:10.100.45.8
  1    306 ::1/128                  On-link
 17   4126 2002::/16                fe80::5efe:10.100.45.8
 17    286 2002:434f:aad4::/64      fe80::5efe:10.100.45.8
 17     38 2002:434f:aad4:8000::/49 On-link
 17     38 2002:434f:aad4:8000::/64 On-link
 17    286 2002:434f:aad4:8000:0:5efe:10.100.26.64/128
                                    On-link
 17    286 2002:434f:aad4:8100::/64 fe80::5efe:10.100.45.8
 17    286 2002:434f:aad5::/64      fe80::5efe:10.100.45.8
 11    281 fe80::/64                On-link
 17    286 fe80::5efe:10.100.26.64/128
                                    On-link
 11    281 fe80::903b:3558:e134:9090/128
                                    On-link
  1    306 ff00::/8                 On-link
 11    281 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

========================= Event log errors: ===============================

Application errors:
==================
Error: (11/23/2011 02:54:44 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/22/2011 11:12:16 AM) (Source: Application Error) (User: )
Description: Faulting application name: aim.exe, version: 5.9.3702.0, time stamp: 0x41b78518
Faulting module name: msvcrt.dll, version: 7.0.7600.16385, time stamp: 0x4a5bda6f
Exception code: 0xc0000005
Fault offset: 0x0000b4ac
Faulting process id: 0xf90
Faulting application start time: 0xaim.exe0
Faulting application path: aim.exe1
Faulting module path: aim.exe2
Report Id: aim.exe3

Error: (11/21/2011 00:31:04 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/20/2011 00:31:39 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/19/2011 01:34:36 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/18/2011 06:29:59 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/18/2011 09:34:38 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/15/2011 09:50:24 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.

Error: (11/13/2011 03:40:34 PM) (Source: Application Error) (User: )
Description: Faulting application name: firefox.exe, version: 7.0.1.4288, time stamp: 0x4e83b93a
Faulting module name: MSVCR71.dll, version: 7.10.3052.4, time stamp: 0x3e561eac
Exception code: 0xc0000005
Fault offset: 0x000128fe
Faulting process id: 0x16c4
Faulting application start time: 0xfirefox.exe0
Faulting application path: firefox.exe1
Faulting module path: firefox.exe2
Report Id: firefox.exe3

Error: (11/13/2011 10:52:41 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "assemblyIdentity1".Error in manifest or policy file "assemblyIdentity2" on line assemblyIdentity3.
The value "MAJOR_VERSION.MINOR_VERSION.BUILD_NUMBER_MAJOR.BUILD_NUMBER_MINOR" of attribute "version" in element "assemblyIdentity" is invalid.


System errors:
=============
Error: (11/23/2011 11:24:54 AM) (Source: EventLog) (User: )
Description: The previous system shutdown at 9:18:57 PM on ?11/?22/?2011 was unexpected.

Error: (11/22/2011 04:47:25 PM) (Source: BROWSER) (User: )
Description: The browser service has failed to retrieve the backup list too many times on transport \Device\NetBT_Tcpip_{8FE0866F-2F7B-4180-B3C9-84AC0FA95632}.
The backup browser is stopping.

Error: (11/22/2011 10:54:11 AM) (Source: EventLog) (User: )
Description: The previous system shutdown at 11:18:00 PM on ?11/?21/?2011 was unexpected.

Error: (11/21/2011 05:18:05 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service depends on the Server service which failed to start because of the following error: 
%%1068

Error: (11/21/2011 05:18:05 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service depends on the Server service which failed to start because of the following error: 
%%1068

Error: (11/21/2011 05:18:05 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service depends on the Server service which failed to start because of the following error: 
%%1068

Error: (11/21/2011 05:18:05 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service depends on the Server service which failed to start because of the following error: 
%%1068

Error: (11/21/2011 05:18:05 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service depends on the Server service which failed to start because of the following error: 
%%1068

Error: (11/21/2011 05:18:05 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service depends on the Server service which failed to start because of the following error: 
%%1068

Error: (11/21/2011 05:18:05 PM) (Source: DCOM) (User: )
Description: 1084MDM{0C0A3666-30C9-11D0-8F20-00805F2CD064}


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

 Update for Microsoft Office 2007 (KB2508958)
2007 Microsoft Office Suite Service Pack 2 (SP2)
Acrobat.com (Version: 2.3.0)
Acrobat.com (Version: 2.3.0.0)
Adobe AIR (Version: 1.5.3.9130)
Adobe Flash Player 10 ActiveX (Version: 10.0.45.2)
Adobe Flash Player 10 Plugin (Version: 10.3.183.7)
Adobe Reader 9.4.4 MUI (Version: 9.4.4)
Alcor Micro USB Card Reader (Version: 1.5.17.25482)
Amazon MP3 Downloader 1.0.10
AOL Instant Messenger
Apple Application Support (Version: 2.0.1)
Apple Mobile Device Support (Version: 3.4.1.2)
Apple Software Update (Version: 2.1.3.127)
ASUS AI Recovery (Version: 1.0.8)
ASUS AP Bank (Version: 1.0.0.0)
ASUS CopyProtect (Version: 1.0.0015)
ASUS Data Security Manager (Version: 1.00.0014)
ASUS FancyStart (Version: 1.0.8)
ASUS LifeFrame3 (Version: 3.0.20)
ASUS Live Update (Version: 2.5.9)
ASUS MultiFrame (Version: 1.0.0019)
ASUS Power4Gear Hybrid (Version: 1.1.28)
ASUS SmartLogon (Version: 1.0.0008)
ASUS Splendid Video Enhancement Technology (Version: 1.02.0028)
ASUS USB2.0 UVC VGA WebCam (Version: 5.8.53120.203)
ASUS Virtual Camera (Version: 1.0.19)
ASUS_Screensaver
ATK Package (Version: 1.0.0001)
AVG 2012 (Version: 12.0.1873)
AVG 2012 (Version: 12.0.2101)
AVG 2012 (Version: 2012.0.1873)
Best Buy Software Installer (Version: 2.1.0.29)
Bing Bar (Version: 7.0.822.0)
Bonjour (Version: 3.0.0.2)
Choice Guard (Version: 1.2.87.0)
ControlDeck (Version: 1.0.5)
ETDWare PS/2-x64 7.0.5.9_WHQL
Fast Boot (Version: 1.0.5)
Google Toolbar for Internet Explorer (Version: 1.0.0)
Google Toolbar for Internet Explorer (Version: 7.2.2308.2056)
Google Update Helper (Version: 1.3.21.79)
Intel(R) Control Center (Version: 1.2.1.1007)
Intel(R) Graphics Media Accelerator Driver (Version: 8.15.10.2021)
iTunes (Version: 10.4.0.80)
Java Auto Updater (Version: 2.0.5.1)
Java(TM) 6 Update 26 (Version: 6.0.260)
Junk Mail filter update (Version: 14.0.8050.1202)
LimeWire 5.5.16 (Version: 5.5.16)
Malwarebytes' Anti-Malware version 1.51.2.1300 (Version: 1.51.2.1300)
McAfee Security Scan Plus (Version: 2.0.181.2)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6015.5000)
Microsoft Office Access MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Enterprise 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Groove MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Groove Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office InfoPath MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Live Add-in 1.3 (Version: 2.0.2313.0)
Microsoft Office Live Meeting 2007 (Version: 8.0.6362.190)
Microsoft Office Office 64-bit Components 2007 (Version: 12.0.6425.1000)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Publisher MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Silverlight (Version: 4.0.60831.0)
Microsoft SQL Server 2005 Compact Edition [ENU] (Version: 3.1.0000)
Microsoft Sync Framework Runtime Native v1.0 (x86) (Version: 1.0.1215.0)
Microsoft Sync Framework Services Native v1.0 (x86) (Version: 1.0.1215.0)
Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570 (Version: 9.0.30729.5570)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Mozilla Firefox 7.0.1 (x86 en-US) (Version: 7.0.1)
MSVCRT (Version: 14.0.1468.721)
MSXML 4.0 SP3 Parser (KB973685) (Version: 4.30.2107.0)
Platform (Version: 1.34)
PMB (Version: 5.2.00.03250)
QuickTime (Version: 7.70.80.34)
Roxio Burn (Version: 1.2)
Roxio Roxio Burn (Version: 1.0.0)
Roxio Update Manager (Version: 6.0.0)
Skype Toolbars (Version: 5.3.7280)
Skype™ 5.3 (Version: 5.3.120)
SofTest (Version: 10.0.1133)
SRS Premium Sound Control Panel (Version: 1.8.2300)
Update for 2007 Microsoft Office System (KB2284654)
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (Version: 1)
Update for Microsoft Office 2007 Help for Common Features (KB963673)
Update for Microsoft Office 2007 System (KB2539530)
Update for Microsoft Office Access 2007 Help (KB963663)
Update for Microsoft Office Excel 2007 Help (KB963678)
Update for Microsoft Office Infopath 2007 Help (KB963662)
Update for Microsoft Office OneNote 2007 (KB980729)
Update for Microsoft Office OneNote 2007 Help (KB963670)
Update for Microsoft Office Outlook 2007 (KB2583910)
Update for Microsoft Office Outlook 2007 Help (KB963677)
Update for Microsoft Office Powerpoint 2007 Help (KB963669)
Update for Microsoft Office Publisher 2007 Help (KB963667)
Update for Microsoft Office Script Editor Help (KB963671)
Update for Microsoft Office Word 2007 Help (KB963665)
Update for Outlook 2007 Junk Email Filter (KB2596560)
VIA Platform Device Manager (Version: 1.34)
Viewpoint Media Player
Visual Studio 2008 x64 Redistributables (Version: 10.0.0.2)
Windows Live Call (Version: 14.0.8050.1202)
Windows Live Communications Platform (Version: 14.0.8050.1202)
Windows Live Essentials (Version: 14.0.8050.1202)
Windows Live Family Safety (Version: 14.0.8052.1208)
Windows Live Mail (Version: 14.0.8050.1202)
Windows Live Messenger (Version: 14.0.8050.1202)
Windows Live Photo Gallery (Version: 14.0.8051.1204)
Windows Live Sign-in Assistant (Version: 5.000.818.6)
Windows Live Sync (Version: 14.0.8050.1202)
Windows Live Upload Tool (Version: 14.0.8014.1029)
Windows Live Writer (Version: 14.0.8050.1202)
WinFlash (Version: 2.26.0)
Wireless Console 3 (Version: 3.0.15)

========================= Memory info: ===================================

Percentage of memory in use: 44%
Total physical RAM: 4061.09 MB
Available physical RAM: 2242.29 MB
Total Pagefile: 8120.32 MB
Available Pagefile: 6051.96 MB
Total Virtual: 4095.88 MB
Available Virtual: 3959.05 MB

========================= Partitions: =====================================

1 Drive c: (OS) (Fixed) (Total:451.11 GB) (Free:382.19 GB) NTFS

========================= Users: ========================================

User accounts for \\DREW-PC

Administrator            Drew                     Guest                    
Work                     


**** End of log ****
















THATS AS FAR AS I HAVE GOT SO FAR.... I TRIED STEP 2.... but windows\system32\consrv.dll was nowhere to be found ( and yes i made sure that i was able to view all files.).... that is where I am for now

#4 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 24 November 2011 - 12:05 PM

Hi dlegg0387,

Looking good. :thumbup2: Please continue with Step 3, above (GMER).
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#5 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 25 November 2011 - 10:12 AM

MER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-25 10:10:35
Windows 6.1.7600
Running: jcql2300.exe


---- Files - GMER 1.0.15 ----

File C:\ADSM_PData_0150 0 bytes
File C:\ADSM_PData_0150\DB 0 bytes
File C:\ADSM_PData_0150\DB\SI.db 624 bytes
File C:\ADSM_PData_0150\DB\UL.db 16 bytes
File C:\ADSM_PData_0150\DB\VL.db 16 bytes
File C:\ADSM_PData_0150\DB\WAL.db 2048 bytes
File C:\ADSM_PData_0150\DragWait.exe 315392 bytes executable
File C:\ADSM_PData_0150\_avt 512 bytes

---- EOF - GMER 1.0.15 ----

#6 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 25 November 2011 - 12:37 PM

Hi dlegg0387,

Let's double check we've found everything:

:step1: Rerun Malwarebytes
Open Malwarebytes, click on the Update tab, and click the check for Updates button (the latest update as of this post is 8238).
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Full Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

If you have trouble updating, troubleshoot Malwarebytes' Anti-Malware

:step2: Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from http://www.superantispyware.com/downloads/SASDEFINITIONS.EXE (copy and paste that website address) and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others checked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Home" button to leave the control center screen.
  • Back on the main screen, under "Select Scan Type" click Complete Scan.
  • On the left, make sure you check C:\.
  • Click Start Complete Scan > Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a USB drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

:step3: I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.


In your next reply, please include:
  • Malwarebytes log
  • SuperAntiSpyware log
  • ESET log
  • How's your computer running now? Please provide a detailed description of any remaining problems, detailed word-for-word error messages that you are receiving, and/or screenshots of strange behavior.

Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#7 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 25 November 2011 - 06:07 PM

malware log---


Database version: 8202

Windows 6.1.7600
Internet Explorer 8.0.7600.16385

11/25/2011 2:31:22 PM
mbam-log-2011-11-25 (14-31-22).txt

Scan type: Full scan (C:\|)
Objects scanned: 359504
Time elapsed: 49 minute(s), 4 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



SUPERANTI

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 11/25/2011 at 03:26 PM

Application Version : 5.0.1136

Core Rules Database Version : 7986
Trace Rules Database Version: 5798

Scan type : Complete Scan
Total Scan Time : 00:49:56

Operating System Information
Windows 7 Home Premium 64-bit (Build 6.01.7600)
UAC On - Limited User

Memory items scanned : 601
Memory threats detected : 0
Registry items scanned : 72211
Registry threats detected : 0
File items scanned : 51852
File threats detected : 558

Adware.Tracking Cookie
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[10].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[11].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[1].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[2].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[3].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[4].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[5].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[6].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[7].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[8].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@advertising[9].txt [ /advertising ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@anrtx.tacoda[1].txt [ /anrtx.tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@anrtx.tacoda[2].txt [ /anrtx.tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@anrtx.tacoda[3].txt [ /anrtx.tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@anrtx.tacoda[4].txt [ /anrtx.tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@anrtx.tacoda[6].txt [ /anrtx.tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@anrtx.tacoda[7].txt [ /anrtx.tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[10].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[11].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[1].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[2].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[3].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[4].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[5].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[6].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[7].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[8].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@ar.atwola[9].txt [ /ar.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[10].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[11].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[1].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[2].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[3].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[4].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[5].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[6].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[7].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[8].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@at.atwola[9].txt [ /at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[10].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[11].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[1].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[2].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[3].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[4].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[5].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[6].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[7].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[8].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@atwola[9].txt [ /atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[10].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[11].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[1].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[2].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[3].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[4].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[5].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[6].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[7].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[8].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@cdn.at.atwola[9].txt [ /cdn.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[1].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[2].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[3].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[4].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[5].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[6].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[7].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[8].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@doubleclick[9].txt [ /doubleclick ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@imrworldwide[2].txt [ /imrworldwide ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@statcounter[1].txt [ /statcounter ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[10].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[11].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[1].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[2].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[3].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[4].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[5].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[6].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[7].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[8].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda.at.atwola[9].txt [ /tacoda.at.atwola ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\drew@tacoda[2].txt [ /tacoda ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\NDMEUP7K.txt [ /cdn.at.atwola.com ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\3Y5N23AD.txt [ /doubleclick.net ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\387P3OF3.txt [ /at.atwola.com ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\KUNUD2HW.txt [ /ar.atwola.com ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\TECS7QWQ.txt [ /advertising.com ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\KGV9UMAJ.txt [ /tacoda.at.atwola.com ]
C:\Users\Drew\AppData\Roaming\Microsoft\Windows\Cookies\EW3XC5D9.txt [ /atwola.com ]
C:\USERS\DREW\AppData\Roaming\Microsoft\Windows\Cookies\4IHQJ836.txt [ Cookie:drew@adsonar.com/adserving ]
C:\USERS\DREW\Cookies\NDMEUP7K.txt [ Cookie:drew@cdn.at.atwola.com/ ]
C:\USERS\DREW\Cookies\4IHQJ836.txt [ Cookie:drew@adsonar.com/adserving ]
C:\USERS\DREW\Cookies\3Y5N23AD.txt [ Cookie:drew@doubleclick.net/ ]
C:\USERS\DREW\Cookies\KUNUD2HW.txt [ Cookie:drew@ar.atwola.com/ ]
C:\USERS\DREW\Cookies\TECS7QWQ.txt [ Cookie:drew@advertising.com/ ]
C:\USERS\DREW\Cookies\EW3XC5D9.txt [ Cookie:drew@atwola.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@findlaw[1].txt [ Cookie:work@findlaw.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@tacoda[2].txt [ Cookie:work@tacoda.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@tacoda[1].txt [ Cookie:work@tacoda.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@nl.sitestat[1].txt [ Cookie:work@nl.sitestat.com/minbuza/mfa/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@www.discountedwheelwarehouse[2].txt [ Cookie:work@www.discountedwheelwarehouse.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@cdn.at.atwola[1].txt [ Cookie:work@cdn.at.atwola.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@comedians.jokes[1].txt [ Cookie:work@comedians.jokes.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@fightnewsextra[1].txt [ Cookie:work@fightnewsextra.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@insocialmedia[1].txt [ Cookie:work@insocialmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@pointroll[3].txt [ Cookie:work@pointroll.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@atwola[2].txt [ Cookie:work@atwola.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@advertising[1].txt [ Cookie:work@advertising.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@ncccbanner.itec.suny[1].txt [ Cookie:work@ncccbanner.itec.suny.edu/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@ethiomedia[1].txt [ Cookie:work@ethiomedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@bookfinder[1].txt [ Cookie:work@bookfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@www.campusexplorer[1].txt [ Cookie:work@www.campusexplorer.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@imrworldwide[2].txt [ Cookie:work@imrworldwide.com/cgi-bin ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@www.questionhub[2].txt [ Cookie:work@www.questionhub.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@findarticles[1].txt [ Cookie:work@findarticles.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@adsonar[2].txt [ Cookie:work@adsonar.com/adserving ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@ar.atwola[2].txt [ Cookie:work@ar.atwola.com/html ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@fourteeng[1].txt [ Cookie:work@fourteeng.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\work@mediacomcable[2].txt [ Cookie:work@mediacomcable.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.blogpiremedia[2].txt [ Cookie:work@www.blogpiremedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@dealtime[2].txt [ Cookie:work@dealtime.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@centralmediaserver[3].txt [ Cookie:work@centralmediaserver.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.bizrate[1].txt [ Cookie:work@www.bizrate.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@orangecounty.ebayclassifieds[2].txt [ Cookie:work@orangecounty.ebayclassifieds.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@clicksor[2].txt [ Cookie:work@clicksor.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@specificmedia[1].txt [ Cookie:work@specificmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@honoluluadvertiser[1].txt [ Cookie:work@honoluluadvertiser.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.qsstats[1].txt [ Cookie:work@www.qsstats.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@tracking.foxnews[2].txt [ Cookie:work@tracking.foxnews.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@roysecityheraldbanner[1].txt [ Cookie:work@roysecityheraldbanner.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.fyxm[3].txt [ Cookie:work@stats.fyxm.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@chitika[2].txt [ Cookie:work@chitika.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@richmedia.yahoo[1].txt [ Cookie:work@richmedia.yahoo.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@imrworldwide[1].txt [ Cookie:work@imrworldwide.com/cgi-bin ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@pointroll[1].txt [ Cookie:work@pointroll.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@traffic.prod.cobaltgroup[2].txt [ Cookie:work@traffic.prod.cobaltgroup.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@findarticles[2].txt [ Cookie:work@findarticles.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@tracker.infra-ad[1].txt [ Cookie:work@tracker.infra-ad.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@snap9.advertserve[2].txt [ Cookie:work@snap9.advertserve.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@eas.apm.emediate[2].txt [ Cookie:work@eas.apm.emediate.eu/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@thefind[3].txt [ Cookie:work@thefind.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@dc.tremormedia[2].txt [ Cookie:work@dc.tremormedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@hairfinder[2].txt [ Cookie:work@hairfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@media.mtvnservices-q.mtvi[1].txt [ Cookie:work@media.mtvnservices-q.mtvi.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adxpose[1].txt [ Cookie:work@adxpose.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@CAHW62O1.txt [ Cookie:work@us.sitestat.com/future/ballhype/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@ext-us.bestofmedia[1].txt [ Cookie:work@ext-us.bestofmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@media.adfrontiers[1].txt [ Cookie:work@media.adfrontiers.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adserving.contextualmarketplace[3].txt [ Cookie:work@adserving.contextualmarketplace.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.qsstats[2].txt [ Cookie:work@www.qsstats.com/dcsuefi5v100004ngrzwvw8xo_9w9f ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@eyewonder[2].txt [ Cookie:work@eyewonder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@oas.adservingml[1].txt [ Cookie:work@oas.adservingml.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@123stat[2].txt [ Cookie:work@123stat.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.honoluluadvertiser[2].txt [ Cookie:work@www.honoluluadvertiser.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@elitedealssupport[2].txt [ Cookie:work@elitedealssupport.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@kanoodle[1].txt [ Cookie:work@kanoodle.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@paypal.thefind[1].txt [ Cookie:work@paypal.thefind.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.commonsensemedia[2].txt [ Cookie:work@www.commonsensemedia.org/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@CA54N005.txt [ Cookie:work@us.sitestat.com/future/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@timesofindia.indiatimes[2].txt [ Cookie:work@timesofindia.indiatimes.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.find-a-therapist[1].txt [ Cookie:work@www.find-a-therapist.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@sdctrack.thomasnet[2].txt [ Cookie:work@sdctrack.thomasnet.com/dcscxxqkamertejzhxf28961k_1u1m ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@optimize.indieclick[1].txt [ Cookie:work@optimize.indieclick.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@analytics.rogersmedia[2].txt [ Cookie:work@analytics.rogersmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@legolas-media[1].txt [ Cookie:work@legolas-media.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.skyscanner[1].txt [ Cookie:work@www.skyscanner.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@fhg.advertserve[2].txt [ Cookie:work@fhg.advertserve.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@statsadv.dadapro[1].txt [ Cookie:work@statsadv.dadapro.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@ads2.dmagazine[1].txt [ Cookie:work@ads2.dmagazine.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@skyscanner[1].txt [ Cookie:work@skyscanner.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@zanox[2].txt [ Cookie:work@zanox.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@sdctrack.thomasnet[4].txt [ Cookie:work@sdctrack.thomasnet.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@media.mtvnservices[2].txt [ Cookie:work@media.mtvnservices.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.linuxquestions[2].txt [ Cookie:work@www.linuxquestions.org/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adinterax[2].txt [ Cookie:work@adinterax.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.skyscanner[2].txt [ Cookie:work@www.skyscanner.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@pathfinder[1].txt [ Cookie:work@pathfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@skyscanner[2].txt [ Cookie:work@skyscanner.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@countryconnect.co[1].txt [ Cookie:work@countryconnect.co.uk/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.tracklead[1].txt [ Cookie:work@www.tracklead.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@nordictrack[2].txt [ Cookie:work@nordictrack.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@ez-tracks[1].txt [ Cookie:work@ez-tracks.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@tourmycountry[2].txt [ Cookie:work@tourmycountry.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@acronymfinder[1].txt [ Cookie:work@acronymfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@race-track-info[1].txt [ Cookie:work@race-track-info.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@indiads[1].txt [ Cookie:work@indiads.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.myaccount.sprint[1].txt [ Cookie:work@www.myaccount.sprint.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@ads.neudesicmediagroup[2].txt [ Cookie:work@ads.neudesicmediagroup.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@sdctrack.thomasnet[1].txt [ Cookie:work@sdctrack.thomasnet.com/dcs8u0ga210000478ev8s20t9_1m4z ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@lockedonmedia[1].txt [ Cookie:work@lockedonmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adserver.lawnsite[2].txt [ Cookie:work@adserver.lawnsite.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@pluckit.demandmedia[2].txt [ Cookie:work@pluckit.demandmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@w3track[2].txt [ Cookie:work@w3track.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.hairfinder[2].txt [ Cookie:work@www.hairfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@discountheatingoilprices[2].txt [ Cookie:work@discountheatingoilprices.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@lucidmedia[2].txt [ Cookie:work@lucidmedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.ez-tracks[1].txt [ Cookie:work@www.ez-tracks.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@intermundomedia[2].txt [ Cookie:work@intermundomedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@tracker.opticsplanet[1].txt [ Cookie:work@tracker.opticsplanet.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adcentriconline[1].txt [ Cookie:work@adcentriconline.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@qnsr[2].txt [ Cookie:work@qnsr.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@mediatakeout[1].txt [ Cookie:work@mediatakeout.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@findlaw[1].txt [ Cookie:work@findlaw.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@csm.rotator.hadj7.adjuggler[1].txt [ Cookie:work@csm.rotator.hadj7.adjuggler.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@twc.rotator.hadj7.adjuggler[1].txt [ Cookie:work@twc.rotator.hadj7.adjuggler.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@e1.cdn.qnsr[1].txt [ Cookie:work@e1.cdn.qnsr.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@mas.midkotamedia[2].txt [ Cookie:work@mas.midkotamedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@media.medhelp[1].txt [ Cookie:work@media.medhelp.org/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@countyofkane[2].txt [ Cookie:work@countyofkane.org/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.optijob[1].txt [ Cookie:work@stats.optijob.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.countrystandardtime[1].txt [ Cookie:work@www.countrystandardtime.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@commonsensemedia[1].txt [ Cookie:work@commonsensemedia.org/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@trackalyzer[1].txt [ Cookie:work@trackalyzer.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@banner.poker770[1].txt [ Cookie:work@banner.poker770.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@cc.gameadserve[2].txt [ Cookie:work@cc.gameadserve.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@findinternettv[2].txt [ Cookie:work@findinternettv.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@oddcast[1].txt [ Cookie:work@oddcast.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@comedians.about[1].txt [ Cookie:work@comedians.about.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@crackle[1].txt [ Cookie:work@crackle.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.townnews[2].txt [ Cookie:work@stats.townnews.com/allegannews.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@ads.10click[2].txt [ Cookie:work@ads.10click.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.midkotatraffic[1].txt [ Cookie:work@www.midkotatraffic.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@backcountry[2].txt [ Cookie:work@backcountry.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@elite-lottery-results[2].txt [ Cookie:work@elite-lottery-results.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@us.sitestat[1].txt [ Cookie:work@us.sitestat.com/future/showhype/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@fidelity.rotator.hadj7.adjuggler[1].txt [ Cookie:work@fidelity.rotator.hadj7.adjuggler.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stat.aldi[1].txt [ Cookie:work@stat.aldi.com/dcsf3t1vbkxy5ftblthvp2pcl_4s1i ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@t1.trackalyzer[1].txt [ Cookie:work@t1.trackalyzer.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.townnews[1].txt [ Cookie:work@stats.townnews.com/codyenterprise.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@us.sitestat[4].txt [ Cookie:work@us.sitestat.com/future/maclife/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.townnews[4].txt [ Cookie:work@stats.townnews.com/co-www2.codyenterprise.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@videofindr[1].txt [ Cookie:work@videofindr.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.backcountry[2].txt [ Cookie:work@www.backcountry.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@mediacomcable[1].txt [ Cookie:work@mediacomcable.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@server.cpmstar[1].txt [ Cookie:work@server.cpmstar.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@forums.crackberry[1].txt [ Cookie:work@forums.crackberry.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@dodtracker[1].txt [ Cookie:work@dodtracker.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@us.sitestat[2].txt [ Cookie:work@us.sitestat.com/future/maximum-pc/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@crackberry[2].txt [ Cookie:work@crackberry.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@cn.clickable[2].txt [ Cookie:work@cn.clickable.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@himedia.individuad[2].txt [ Cookie:work@himedia.individuad.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adserver.uproxx[2].txt [ Cookie:work@adserver.uproxx.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@fourteeng[1].txt [ Cookie:work@fourteeng.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@petfinder[1].txt [ Cookie:work@petfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@tracking.dc-storm[2].txt [ Cookie:work@tracking.dc-storm.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@puppyfinder[2].txt [ Cookie:work@puppyfinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@forum.rotator.hadj7.adjuggler[2].txt [ Cookie:work@forum.rotator.hadj7.adjuggler.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@mediafire[1].txt [ Cookie:work@mediafire.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@linksynergy.onlineshoes[2].txt [ Cookie:work@linksynergy.onlineshoes.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@questionhome[2].txt [ Cookie:work@questionhome.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.fortedownloads[1].txt [ Cookie:work@www.fortedownloads.com/Plato-Global-Greativity-Plato-Media-Player-Free/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@dallascounty[2].txt [ Cookie:work@dallascounty.org/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.townnews[9].txt [ Cookie:work@stats.townnews.com/napavalleyregister.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@bannertgt[2].txt [ Cookie:work@bannertgt.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@gossipteen[2].txt [ Cookie:work@gossipteen.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@tracking.realtor[1].txt [ Cookie:work@tracking.realtor.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@steelhousemedia[2].txt [ Cookie:work@steelhousemedia.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@vector1media[2].txt [ Cookie:work@vector1media.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@male-enhancement[3].txt [ Cookie:work@male-enhancement.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.counttrackula[1].txt [ Cookie:work@www.counttrackula.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@google[5].txt [ Cookie:work@google.com/accounts/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@finditnow[1].txt [ Cookie:work@finditnow.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.mediafire[1].txt [ Cookie:work@www.mediafire.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@elitestv[2].txt [ Cookie:work@elitestv.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.warezflow[2].txt [ Cookie:work@www.warezflow.us/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@s14.shinystat[2].txt [ Cookie:work@s14.shinystat.com/cgi-bin/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.skinsight[1].txt [ Cookie:work@www.skinsight.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@messagespace.advertserve[1].txt [ Cookie:work@messagespace.advertserve.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@e-2dj6wnlywnazmlo.stats.esomniture[2].txt [ Cookie:work@e-2dj6wnlywnazmlo.stats.esomniture.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@adx.bixee[1].txt [ Cookie:work@adx.bixee.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@homefinder[1].txt [ Cookie:work@homefinder.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@s3.trafficmaxx[1].txt [ Cookie:work@s3.trafficmaxx.de/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@male-enhancement-pills[2].txt [ Cookie:work@male-enhancement-pills.net/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@istockcharts.multimedia[2].txt [ Cookie:work@istockcharts.multimedia.de/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@us.sitestat[3].txt [ Cookie:work@us.sitestat.com/future/gamesradar/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@peoplefinders[2].txt [ Cookie:work@peoplefinders.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.justclicklocal[2].txt [ Cookie:work@www.justclicklocal.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.3gnmedia[2].txt [ Cookie:work@www.3gnmedia.com/forums/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@ie-stat.bmmetrix[1].txt [ Cookie:work@ie-stat.bmmetrix.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@multimedia.foxsports[2].txt [ Cookie:work@multimedia.foxsports.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.clicks[1].txt [ Cookie:work@www.clicks.ro/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@stats.townnews[7].txt [ Cookie:work@stats.townnews.com/pressofatlanticcity.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@www.questionhub[2].txt [ Cookie:work@www.questionhub.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@asianmediawiki[2].txt [ Cookie:work@asianmediawiki.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@t2.trackalyzer[1].txt [ Cookie:work@t2.trackalyzer.com/ ]
C:\USERS\WORK\AppData\Roaming\Microsoft\Windows\Cookies\Low\work@photobucket[2].txt [ Cookie:work@photobucket.com/ads/ ]
C:\USERS\WORK\Cookies\work@findlaw[1].txt [ Cookie:work@findlaw.com/ ]
C:\USERS\WORK\Cookies\work@tacoda[2].txt [ Cookie:work@tacoda.net/ ]
C:\USERS\WORK\Cookies\work@tacoda[1].txt [ Cookie:work@tacoda.net/ ]
C:\USERS\WORK\Cookies\work@nl.sitestat[1].txt [ Cookie:work@nl.sitestat.com/minbuza/mfa/ ]
C:\USERS\WORK\Cookies\work@www.discountedwheelwarehouse[2].txt [ Cookie:work@www.discountedwheelwarehouse.com/ ]
C:\USERS\WORK\Cookies\work@cdn.at.atwola[1].txt [ Cookie:work@cdn.at.atwola.com/ ]
C:\USERS\WORK\Cookies\work@comedians.jokes[1].txt [ Cookie:work@comedians.jokes.com/ ]
C:\USERS\WORK\Cookies\work@fightnewsextra[1].txt [ Cookie:work@fightnewsextra.com/ ]
C:\USERS\WORK\Cookies\work@insocialmedia[1].txt [ Cookie:work@insocialmedia.com/ ]
C:\USERS\WORK\Cookies\work@pointroll[3].txt [ Cookie:work@pointroll.com/ ]
C:\USERS\WORK\Cookies\work@atwola[2].txt [ Cookie:work@atwola.com/ ]
C:\USERS\WORK\Cookies\work@advertising[1].txt [ Cookie:work@advertising.com/ ]
C:\USERS\WORK\Cookies\work@ncccbanner.itec.suny[1].txt [ Cookie:work@ncccbanner.itec.suny.edu/ ]
C:\USERS\WORK\Cookies\work@ethiomedia[1].txt [ Cookie:work@ethiomedia.com/ ]
C:\USERS\WORK\Cookies\work@bookfinder[1].txt [ Cookie:work@bookfinder.com/ ]
C:\USERS\WORK\Cookies\work@www.campusexplorer[1].txt [ Cookie:work@www.campusexplorer.com/ ]
C:\USERS\WORK\Cookies\work@imrworldwide[2].txt [ Cookie:work@imrworldwide.com/cgi-bin ]
C:\USERS\WORK\Cookies\work@www.questionhub[2].txt [ Cookie:work@www.questionhub.com/ ]
C:\USERS\WORK\Cookies\work@findarticles[1].txt [ Cookie:work@findarticles.com/ ]
C:\USERS\WORK\Cookies\work@adsonar[2].txt [ Cookie:work@adsonar.com/adserving ]
C:\USERS\WORK\Cookies\work@ar.atwola[2].txt [ Cookie:work@ar.atwola.com/html ]
C:\USERS\WORK\Cookies\work@fourteeng[1].txt [ Cookie:work@fourteeng.net/ ]
C:\USERS\WORK\Cookies\work@mediacomcable[2].txt [ Cookie:work@mediacomcable.com/ ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\DREW\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\USERS\DREW\APPDATA\LOCAL\TEMP\COOKIES\DREW@DOUBLECLICK[1].TXT [ /DOUBLECLICK ]
ad.insightexpressai.com [ C:\USERS\DREW\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\LZ5F9NMA ]
media.kyte.tv [ C:\USERS\DREW\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\LZ5F9NMA ]
secure-us.imrworldwide.com [ C:\USERS\DREW\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\LZ5F9NMA ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.yieldmanager.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.avgtechnologies.112.2o7.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
server.iad.liveperson.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.apmebf.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.mediaplex.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.apmebf.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.akamai.interclickproxy.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.tribalfusion.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ru4.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.r1-ads.ace.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.at.atwola.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.thefriskycom.122.2o7.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.brighthouse.122.2o7.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.bizrate.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.bizrate.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.bizrate.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
media.gsimedia.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adxpose.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
a.visualrevenue.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.kontera.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.bs.serving-sys.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.solvemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.solvemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.andomedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.lucidmedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.realmedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
network.realmedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ru4.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.specificclick.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.eyeviewads.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.eyeviewads.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.getclicky.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.static.getclicky.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
in.getclicky.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adserver.adtechus.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.statcounter.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
statse.webtrendslive.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.mediaplex.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
track.prd1.netshelter.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.eyewonder.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.eyewonder.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.247realmedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
accounts.google.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.fastclick.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
.viewablemedia.net [ C:\USERS\DREW\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\CVCN6I6T.DEFAULT\COOKIES.SQLITE ]
acvs.mediaonenetwork.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
ad.doubleclick.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
bbca.channelfinder.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
blueflywidget.organicspreadmedia.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
cdn.insights.gravity.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
cdn2.invitemedia.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
cdn4.specificclick.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
cdn5.specificclick.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
cloudfront.mediamatters.org [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
content.oddcast.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
content.yieldmanager.edgesuite.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
convoad.technoratimedia.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
core.insightexpressai.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
countdownpage.createyourcountdown.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
crackle.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
ds.serving-sys.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
findel.scene7.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
ia.media-imdb.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
ictv-cdn-hw.indieclicktv.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
ictv-ic-ec.indieclicktv.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
indieclick.3janecdn.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
l.content.oddcast.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media-glam.pictela.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media-macys.pictela.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media-natgeo.pictela.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.ign.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.kelbymediagroup.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.king5.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.ky3.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.movieweb.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.mtvnservices-q.mtvi.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.mtvnservices.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.nbcaugusta.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.nbcchicago.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.nbcsandiego.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.oldnavyweekly.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.onsugar.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.oprah.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.perthnow.com.au [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.scanscout.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.socialvibe.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.vmixcore.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media.wfxb.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media01.kyte.tv [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media1.break.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media1.spinletslab.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
media10.washingtonpost.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
mediaforgews.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
msnbcmedia.msn.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
obamacountdownwidget.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
objects.tremormedia.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
parksandresorts2.wdpromedia.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
richmedia247.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
s0.2mdn.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
secure-us.imrworldwide.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
spe.atdmt.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
static.2mdn.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
tracksimple.s3.amazonaws.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
udn.specificclick.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
video.redorbit.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
widget1.adnet.vn [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
www.gsdiscount.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
www.naiadsystems.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
www.soundclick.com [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
www.trackitdown.net [ C:\USERS\WORK\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2UD6YQRS ]
C:\USERS\WORK\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\WORK@1ZZ.CQCOUNTER[1].TXT [ /1ZZ.CQCOUNTER ]
C:\USERS\WORK\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\WORK@ADS.NEXSTARDIGITAL[1].TXT [ /ADS.NEXSTARDIGITAL ]

Trojan.Agent/Gen-Sirefef
C:\USERS\DREW\APPDATA\LOCAL\TEMP\819.4735.EXE
C:\USERS\DREW\APPDATA\LOCAL\TEMP\KYNCQFTIWL
C:\USERS\DREW\APPDATA\LOCAL\TEMP\LYM.DLL
C:\USERS\DREW\APPDATA\LOCALLOW\SUN\JAVA\DEPLOYMENT\CACHE\6.0\11\58B73D0B-7C6F6F93
C:\USERS\DREW\APPDATA\ROAMING\AV PROTECTION 2011.EXE
C:\USERS\DREW\DOCUMENTS\SWTD.EXE



ESET

C:\Program Files (x86)\AIM\Sysfiles\WxBug.EXE Win32/Adware.WBug.A application deleted - quarantined
C:\Users\Work\Downloads\aim593702.exe Win32/Adware.WBug.A application deleted - quarantined

#8 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 25 November 2011 - 06:16 PM

Hi dlegg0387,

Looking good. :thumbup2:

:step1: Please rerun Malwarebytes
Open Malwarebytes, click on the Update tab, and click the check for Updates button (the latest update as of this post is 8242; your previous log had an outdated 8202 database version).
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

If you have trouble updating, troubleshoot Malwarebytes' Anti-Malware


Please copy and paste the latest Malwarebytes log in your next reply.

Also, please let me know how is your computer running now? Please provide a detailed description of any remaining problems, detailed word-for-word error messages that you are receiving, and/or screenshots of strange behavior.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#9 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 25 November 2011 - 06:42 PM

the computer is running fine ( of course a little slower than they day i got it ... but good nonetheless.... i never got any google redirects to my knowledge with this virus.... but when it first hit, i had those fake messages -- "av just stopped an email from going out " etc etc.... )... those only happened once..


malware log

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8242

Windows 6.1.7600
Internet Explorer 8.0.7600.16385

11/25/2011 6:38:52 PM
mbam-log-2011-11-25 (18-38-52).txt

Scan type: Quick scan
Objects scanned: 189884
Time elapsed: 3 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#10 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 25 November 2011 - 06:59 PM

Hi dlegg0387,

Your computer looks clean!

Let's take some preventative steps to ensure you don't get infected again:


:step1: Please download OTCleanIt and save it to desktop.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.

:step2: P2P Warning
Going over your logs I noticed that you have LimeWire 5.5.16 installed.
  • Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.
  • They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.
  • Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.
  • The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications.
It is pretty much certain that if you continue to use P2P programs, you will get infected again.
I would recommend that you uninstall LimeWire, however that choice is up to you. If you choose to remove these programs, you can do so via Start > Control Panel > Programs and Features

:step3: Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7u1-windows-i586-s.exe (or jre-7u1-windows-x64.exe for 64-bit) to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.

:step4: Like Java, outdated versions of Adobe Flash and Adobe Reader have vulnerabilities that malware can use to reinfect your computer. Please update to the latest, secure versions of each:

:step5: Make Internet Explorer more secure:
Hold down the Windows Key, and press the R key.
In the Run Dialog box, type: inetcpl.cpl & click OK
Click on the Security tab,
Click Reset all zones to default level
Next Click OK, then Apply button and then OK to exit the Internet Properties page.

:step6: Install the Latest Version of Common Software:
It is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting http://secunia.com/vulnerability_scanning/online/ and http://www.calendarofupdates.com/updates/calendar.html.

I recommend FileHippo's update checker that scans your computer for programs it recognizes and allows you to easily download new versions of common software: http://filehippo.com/updatechecker/UpdateChecker.exe

:step7: Finally, read this tutorial and follow each of the steps:
http://www.bleepingcomputer.com/tutorials/tutorial82.html

Please feel free to post any future computer problems in the appropriate forum. Have a great day! :)
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#11 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 25 November 2011 - 07:23 PM

thanks so much.... for the future... should i run malwarebytes and superantispy just like i did here (if a problem arises)

#12 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 25 November 2011 - 07:25 PM

You're welcome. Yes, running SuperAntiSpyware and Malwarebytes scans tend to be a good first line of defense, if they are each updated prior to scanning with them. However, they may not be able to remove some of the more difficult malware that is out there.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#13 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 25 November 2011 - 07:35 PM

ran avg again--- the same windows/system32/consrv.dll trojan shows up.....

#14 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:26 PM

Posted 25 November 2011 - 08:01 PM

Hi dlegg0387,

Let's try finding that file...

Please download SystemLook and save it to your Desktop
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :filefind
    consrv.dll
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#15 dlegg0387

dlegg0387
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:26 PM

Posted 25 November 2011 - 08:07 PM

SystemLook 30.07.11 by jpshortstuff
Log created at 20:05 on 25/11/2011 by Drew
Administrator - Elevation successful

========== filefind ==========

Searching for "consrv.dll"
C:\Windows\System32\consrv.dll --a---- 54272 bytes [23:31 13/07/2009] [01:39 14/07/2009] (Unable to calculate MD5)

-= EOF =-

i see it now, i swear when i tried to find it the other day it wasnt there




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users