Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Am I infected?


  • Please log in to reply
15 replies to this topic

#1 Mistyreus

Mistyreus

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 02 January 2012 - 08:07 PM

HI, I'm new here, and I think I must have some sort of malware. However, Malwarebytes isn't finding anything. :(So, I'm unsure what to do from here, but having google or yahoo redirect any search I make is not OK. For background info, I had the AntiVirus 2012 bug earlier today, and Malwarebytes got rid of that for me. My computer hasn't been the same since though. :(

Thank in advance for any help you may be able to offer.

Misty

BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:06:22 AM

Posted 02 January 2012 - 08:09 PM

please post the logs from malwarebytes.

#3 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 03 January 2012 - 07:16 AM

This is the quick scan, I can't run full scan, Malwarebytes keeps encountering an error about 10 minutes in when I try that. Last night, I did run a full scan though, and it came back with nothing as well. I will post the log for that one though on the next post.

______________________________________________________________________________________________________________

Malwarebytes Anti-Malware 1.60.0.1800
www.malwarebytes.org

Database version: v2012.01.02.02

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
The XXXX Family :: XXXX-3BD685AC51 [administrator]

1/3/2012 6:56:02 AM
mbam-log-2012-01-03 (06-56-02).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 220696
Time elapsed: 12 minute(s), 20 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

Edited by Mistyreus, 03 January 2012 - 07:21 AM.


#4 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 03 January 2012 - 07:20 AM

And here's the full scan from last night.

______________________________________________________________________________________________

Malwarebytes Anti-Malware 1.60.0.1800
www.malwarebytes.org

Database version: v2012.01.02.02

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
The XXXX Family :: XXXX-3BD685AC51 [administrator]

1/2/2012 7:59:34 PM
mbam-log-2012-01-02 (19-59-34).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 291455
Time elapsed: 1 hour(s), 5 minute(s), 4 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

Edited by Mistyreus, 03 January 2012 - 07:21 AM.


#5 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:06:22 AM

Posted 03 January 2012 - 09:29 AM

Please download and run Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

SUPERAntiSpyware:

Please download and scan with SUPERAntiSpyware Free

  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are unchecked (leave all others checked):
    • Ignore files larger then 4mb
    • Ignore non-executable files

    Now Perform the scan with SUPERAntiSpyware as follows:
    • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive.
    • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • If asked if you want to reboot, click "Yes" and reboot normally.
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.[list]
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

SAS Portable
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now GMER

GMER does not work in 64bit Mode!!!!!!

Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic Full Scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.


All scans above should be performed in regular boot mode, and if that is not possible then I will post instructions in a follow up reply on how to get into Safe Mode to perform the scans. Also all scans should be COMPLETE and not quick unless specifically instructed to do so.

#6 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 03 January 2012 - 08:25 PM

OK, thanks for the reply! 'm home from work, and ready to tackle thing again. I'm using a different computer than the one infected to post here, so it's going to take a lil bit to get it all done.

7:28pm - I downloaded SecurityCheck, saved it to my desktop and got the following message:

netsh.exe - Entry Point Not Found
The Procedure entry point MigrateWinsockConfiguration cold not be located in the dynamic link library MSWSOCK.dll.


7:32pm - Next, SuperAntiSpyware. Downloaded, clicked to run it, it encountered an error and had to shut down. Trying again. OK, it's scanning now. It put 26 icons on my desktop. Is that normal? And are they OK to move or delete? Yikes...187 found so far.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/03/2012 at 08:11 PM

Application Version : 5.0.1142

Core Rules Database Version : 8095
Trace Rules Database Version: 5907

Scan type : Complete Scan
Total Scan Time : 00:39:50

Operating System Information
Windows XP Home Edition 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 473
Memory threats detected : 0
Registry items scanned : 38633
Registry threats detected : 1
File items scanned : 87492
File threats detected : 248

Adware.Tracking Cookie
C:\Documents and Settings\The xxxx Family\Cookies\the__family@adlegend[2].txt [ /adlegend ]
C:\Documents and Settings\The xxxx Family\Cookies\the__family@adserver.adtechus[1].txt [ /adserver.adtechus ]
C:\Documents and Settings\The xxxx Family\Cookies\the__family@cdn.jemamedia[2].txt [ /cdn.jemamedia ]
C:\Documents and Settings\The xxxx Family\Cookies\the__family@doubleclick[1].txt [ /doubleclick ]
C:\Documents and Settings\The xxxx Family\Cookies\the__family@legolas-media[2].txt [ /legolas-media ]
C:\Documents and Settings\The xxxx Family\Cookies\the__family@r1-ads.ace.advertising[1].txt [ /r1-ads.ace.advertising ]
C:\Documents and Settings\The xxxx Family\Cookies\the__family@www.googleadservices[1].txt [ /www.googleadservices ]
C:\Documents and Settings\The xxxx Family\Cookies\DLV2RB1V.txt [ /doubleclick.net ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\emma_&_joe@doubleclick[2].txt [ Cookie:emma & joe@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\emma_&_joe@imrworldwide[2].txt [ Cookie:emma & joe@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\64CQKV5K.txt [ Cookie:emma & joe@invitemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\LTNA8HO5.txt [ Cookie:emma & joe@media-mgmt.armorgames.com/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\emma_&_joe@www.googleadservices[1].txt [ Cookie:emma & joe@www.googleadservices.com/pagead/conversion/1072682837/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\emma_&_joe@insightexpressai[1].txt [ Cookie:emma & joe@insightexpressai.com/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\emma_&_joe@adserver.adtechus[1].txt [ Cookie:emma & joe@adserver.adtechus.com/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\03JXIGRG.txt [ Cookie:emma & joe@interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\Cookies\emma_&_joe@adlegend[2].txt [ Cookie:emma & joe@adlegend.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\FGEFKI7Q.txt [ Cookie:system@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\A1BK6011.txt [ Cookie:system@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\3XJ9M6TR.txt [ Cookie:system@fastclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CTCN5POM.txt [ Cookie:system@www.burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KNZC72FT.txt [ Cookie:system@perfectadserver.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BSVNWEPF.txt [ Cookie:system@dc.tremormedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\89N01RKR.txt [ Cookie:system@tacoda.at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\FMDIIGYW.txt [ Cookie:system@ox-d.enveromedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EQOWXQ5H.txt [ Cookie:system@newyorker.com/ads/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\WBAPRI3S.txt [ Cookie:system@pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5VDQH4OV.txt [ Cookie:system@myroitracking.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\4S2V9GJO.txt [ Cookie:system@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1T26K4PK.txt [ Cookie:system@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KQRUEH7O.txt [ Cookie:system@www.findsearchengineresults.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\684P3VPN.txt [ Cookie:system@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6UU841ES.txt [ Cookie:system@goclicker.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\93NX1Y2T.txt [ Cookie:system@marchex.bafind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HY6VE2U2.txt [ Cookie:system@adsonar.com/adserving ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\73FPZ0D5.txt [ Cookie:system@atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\PEEDRCQB.txt [ Cookie:system@trafficno.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LNK5L4VH.txt [ Cookie:system@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LM7TWHYV.txt [ Cookie:system@lucidmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0WFIWF7Q.txt [ Cookie:system@clicks.thespecialsearch.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KY3XLPXQ.txt [ Cookie:system@trafficmp.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HM0X5Z2U.txt [ Cookie:system@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\63DID2KG.txt [ Cookie:system@ads.pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\4K698J80.txt [ Cookie:system@xml.prostreammedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\UG2O4VS7.txt [ Cookie:system@realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\JNMB77WN.txt [ Cookie:system@educationcom.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\H06W2UYJ.txt [ Cookie:system@martiniadnetwork.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\OWEW5279.txt [ Cookie:system@uiadserver.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9EGECYGH.txt [ Cookie:system@burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2VR13V7U.txt [ Cookie:system@adbrite.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\39CJJBBX.txt [ Cookie:system@yieldmanager.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\H9L9JVAI.txt [ Cookie:system@mediabrandsww.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\WKKRO0OI.txt [ Cookie:system@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\XT5I9SVK.txt [ Cookie:system@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\PDDA36VP.txt [ Cookie:system@advertise.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Q9OFRPJL.txt [ Cookie:system@crackle.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\WLA1WGHH.txt [ Cookie:system@ad2.adfarm1.adition.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GIQZDVVS.txt [ Cookie:system@pro-market.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ALOSVRF1.txt [ Cookie:system@casalemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VK86KJ09.txt [ Cookie:system@bizzclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\73T1MBCU.txt [ Cookie:system@adserver.adtechus.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6357POCC.txt [ Cookie:system@questionmarket.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ZTVGKZA2.txt [ Cookie:system@r1-ads.ace.advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\53ZRRHO7.txt [ Cookie:system@smashfind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ZZ0X7BAM.txt [ Cookie:system@stevesmithmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\76UV8O94.txt [ Cookie:system@tribalfusion.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\7D33LN0Q.txt [ Cookie:system@statcounter.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ZAYBW9MF.txt [ Cookie:system@bluesearchsite.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\08T6WTQO.txt [ Cookie:system@clicksor.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Y24AM66M.txt [ Cookie:system@cdn.jemamedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\OBSXCX81.txt [ Cookie:system@histats.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1FT9E0V7.txt [ Cookie:system@mm.chitika.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\SB4LA8VG.txt [ Cookie:system@advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EJEJG3DT.txt [ Cookie:system@content.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\34ATJS9P.txt [ Cookie:system@citygridmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KH2HBS33.txt [ Cookie:system@youngbucks.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5B9MJM70.txt [ Cookie:system@exoclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MA2WCW2F.txt [ Cookie:system@findology.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0B014A3P.txt [ Cookie:system@2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\99YDAHVF.txt [ Cookie:system@d.mediadakine.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\FWZPMQTC.txt [ Cookie:system@ads.gamersmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BM2MEQS6.txt [ Cookie:system@indieclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KV11GGYX.txt [ Cookie:system@geltmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BQUHPV2I.txt [ Cookie:system@www.usalawfirmfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\O4PD2FZT.txt [ Cookie:system@dmtracker.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LMZZAURA.txt [ Cookie:system@bravetmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\K87MJ2G9.txt [ Cookie:system@sexad.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0Y4KOTGY.txt [ Cookie:system@stat.onestat.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\65QWQ9MF.txt [ Cookie:system@dmfind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\XWA8DKBA.txt [ Cookie:system@www.guysfinders.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MKYEM07I.txt [ Cookie:system@ar.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\N4052BO0.txt [ Cookie:system@servestats.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\M0IT5MPF.txt [ Cookie:system@intfind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\H2O04644.txt [ Cookie:system@akamai.interclickproxy.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2TJQ3HD7.txt [ Cookie:system@clicks.geltmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6DMHK7A8.txt [ Cookie:system@optimize.indieclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NL0Y64LN.txt [ Cookie:system@www.pornhub.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\SQQ7WL2I.txt [ Cookie:system@eas.apm.emediate.eu/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\U29ZLTI8.txt [ Cookie:system@bridge1.admarketplace.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\JO2U5OXA.txt [ Cookie:system@usalawfirmfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0A1GH7KG.txt [ Cookie:system@eclickz.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\RDLJNMFG.txt [ Cookie:system@sitefindonline.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\7F2CNZCK.txt [ Cookie:system@supermediaservices.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2SVJL3DP.txt [ Cookie:system@linksynergy.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2UP653PU.txt [ Cookie:system@goodcholesterolcount.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LA8TK16U.txt [ Cookie:system@stats.ilivid.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9R1LAFF6.txt [ Cookie:system@ads.crakmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IXRMRHEB.txt [ Cookie:system@www.bestdatafind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HOFXBI8E.txt [ Cookie:system@kanoodle.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\W81VHB49.txt [ Cookie:system@amazon-adsystem.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\W8SFYXY6.txt [ Cookie:system@ads.bridgetrack.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1XUL2CF4.txt [ Cookie:system@usasupermarketfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\OKOVFKJH.txt [ Cookie:system@histats.com/stats/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Z560HZ4G.txt [ Cookie:system@micklemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MSO9OLDL.txt [ Cookie:system@ggpublishing.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\RG6GC8GF.txt [ Cookie:system@artcitymedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NAZVV5X5.txt [ Cookie:system@great-deal-find.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NDBEZZH0.txt [ Cookie:system@cn.clickable.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\RFVSEV77.txt [ Cookie:system@newyorker.com/appjs/stats/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BHUCYACX.txt [ Cookie:system@boom-find.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\UMKYSI7Q.txt [ Cookie:system@entrepreneur.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0TFUCMDF.txt [ Cookie:system@xm.xtendmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CNMK4705.txt [ Cookie:system@liveperson.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1AM8VT73.txt [ Cookie:system@network.realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Z6IDNE3V.txt [ Cookie:system@server.cpmstar.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\AW6BE7FR.txt [ Cookie:system@brandspotmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\E3D4769F.txt [ Cookie:system@best-neighborhood-search.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\P1YAPBZJ.txt [ Cookie:system@247realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\U9TO1B1Y.txt [ Cookie:system@click.scour.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\W9RO09UZ.txt [ Cookie:system@mediaservices-d.openxenterprise.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1JILMLBI.txt [ Cookie:system@xml.trafficengine.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5O0IMOBK.txt [ Cookie:system@adtech.de/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VAQG3LJS.txt [ Cookie:system@xml.admanage.com/xml/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YOT9DD98.txt [ Cookie:system@ehg-bbbsorg.hitbox.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\RFSU0F7X.txt [ Cookie:system@r.looksmart.com/og/pr=Psr;ro=1;rc=1;digest=360b61c65ec26f07c234be2ff24f25b1;kid=44a19bfe5b0a74913af6c118f6b2aad1;t=1325516584;v=8;data=bNI8pPb8qWFTHdEz_0_KPXjKNM6qVcUnZd1jSH9yt2sZ53oKj1FdPPARi18ykE_FS5LDKBqnB7B_0Mjjb9Ywf4KzJWZnndKVkhgD-84a5ZObRQJMMlwhtPEW_y2C1_PcECyRPgGtwwSLCyIjzJgfs61zIz4NzSQQhBiup9muDLrb_jG7fB4WLg;uh=103x10245266819871828795;la=1073242;lm=1802068;ad=753241571;ag=763556759;kw=1452822436;qt=find%20insurance%20life%20policy;vr=12;lt=BM;ip=71.92.36.145;pt=;st=30.20.5.0.0.0.0;os=991.130.1.0.1.94.4.18;sy=keyword;my=broad;geo=894417;vid=0;subid=10018;opi=inter_low;ii=4123.62a5.4f01c728.40af;pn=;to=;tc=1;po=1;pc=1;pi=inter_low;ts=;rm=;pfid=260648;rh=altoonafootball.us%7Chttp://star.feedsmixer.org/100/8075/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\48RS5XHO.txt [ Cookie:system@easysearchsite.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CJBEHI2R.txt [ Cookie:system@adserving.ezanga.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\877WWKR9.txt [ Cookie:system@citi.bridgetrack.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\W7UPXXN2.txt [ Cookie:system@www.usaatmfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LWW74SVS.txt [ Cookie:system@www.usasupermarketfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HT3D3TY8.txt [ Cookie:system@my.enveromedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1TCXA5F5.txt [ Cookie:system@click.jve.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MKZ06SHD.txt [ Cookie:system@ads.zeusclicks.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\WZ2VX0PR.txt [ Cookie:system@www.answered-questions.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KC7EU2D4.txt [ Cookie:system@pluckit.demandmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VO1YX73M.txt [ Cookie:system@seek-more.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VD92HJ80.txt [ Cookie:system@usachurchfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EP2QM50N.txt [ Cookie:system@fisherinvestments.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IYZR1O4T.txt [ Cookie:system@googleads.g.doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9GI0U5GX.txt [ Cookie:system@rotator.adjuggler.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LCERZLP4.txt [ Cookie:system@tmtraffic.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IQJS52Y9.txt [ Cookie:system@warnerbros.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9L5EDN52.txt [ Cookie:system@eyewonder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\REUQ6BNY.txt [ Cookie:system@andomedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\F42C52I1.txt [ Cookie:system@liveperson.net/hc/44153975 ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\DEZ3VOF8.txt [ Cookie:system@ezsearchresults.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GUSWBAW0.txt [ Cookie:system@getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\C4KP9ZIX.txt [ Cookie:system@find-real.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\PJX74AAG.txt [ Cookie:system@tracking.servedbyy.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\J4LKV9DN.txt [ Cookie:system@littlegreenfind.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\AWP8PJZI.txt [ Cookie:system@mifind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\X1WAI9K8.txt [ Cookie:system@adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\SOTXNB0C.txt [ Cookie:system@static.getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HHX15VHX.txt [ Cookie:system@adup.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LL91MB2O.txt [ Cookie:system@adserver2.eclickz.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YSX0P8KS.txt [ Cookie:system@ads.saymedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\J8JZQ7ZF.txt [ Cookie:system@bs.serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\APSBMO9H.txt [ Cookie:system@openx.overadmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1GJEPJZT.txt [ Cookie:system@t.pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CGBHAOCX.txt [ Cookie:system@tag.2bluemedia.hiro.tv/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LMBHVCXU.txt [ Cookie:system@filter.plusfind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2JVTZL8N.txt [ Cookie:system@unrulymedia.com/blank.gif ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2R203PSY.txt [ Cookie:system@chitika.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5QXWD2VD.txt [ Cookie:system@perfectsearchengines.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\N9YKHOT3.txt [ Cookie:system@azjmp.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\3OUQLIRL.txt [ Cookie:system@content.yieldmanager.com/ak/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Y5VYTOBI.txt [ Cookie:system@lokyfind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\084E5VQN.txt [ Cookie:system@sysufind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LNVLM5F4.txt [ Cookie:system@totalbeauty.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1417DX09.txt [ Cookie:system@greensearchsquad.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\J17AMRP1.txt [ Cookie:system@www.path-tracker.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ELRQE7GR.txt [ Cookie:system@www.googleadservices.com/pagead/conversion/998290247/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\I1RBCP5D.txt [ Cookie:system@adinterax.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\83BTE42C.txt [ Cookie:system@seek-home.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1II74KVU.txt [ Cookie:system@kontera.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\55H1ID8W.txt [ Cookie:system@www.findallofittoday.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\8AICUIWO.txt [ Cookie:system@zbox.zanox.com/ ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE7UCXJ9 ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.adserver.adtechus.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.specificclick.net [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.kitaramedia.122.2o7.net [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.bs.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.apmebf.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.fastclick.net [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\EMMA & JOE\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\8QQ8OX8M.DEFAULT\COOKIES.SQLITE ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\COOKIES\EMMA_&_JOE@APMEBF[1].TXT [ /APMEBF ]
C:\DOCUMENTS AND SETTINGS\EMMA & JOE\COOKIES\EMMA_&_JOE@SERVER.CPMSTAR[1].TXT [ /SERVER.CPMSTAR ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
cdn.fondnessmedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
cdn.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
content.yieldmanager.edgesuite.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
convoad.technoratimedia.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
crackle.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
media.mtvnservices.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
media.oprah.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
media1.break.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
secure-uk.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
sftrack.searchforce.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
spe.atdmt.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
tag.2bluemedia.hiro.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]
www.pornhub.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\6GKU3C7B ]

Trojan.Agent/Gen-Nullo[Short]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{A3FEA160-4BA5-4AFC-9FBA-EBE2189520C1}\RP33\A0003457.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{A3FEA160-4BA5-4AFC-9FBA-EBE2189520C1}\RP33\A0003458.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{A3FEA160-4BA5-4AFC-9FBA-EBE2189520C1}\RP33\A0003466.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{A3FEA160-4BA5-4AFC-9FBA-EBE2189520C1}\RP33\A0003467.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{A3FEA160-4BA5-4AFC-9FBA-EBE2189520C1}\RP33\A0009160.EXE

Adware.CouponBar
C:\WINDOWS\SYSTEM32\CPNPRT2.CID

System.BrokenFileAssociation
HKCR\.exe


Going to post this now, hopefully you're around and scan this while I do the GMER.

Misty :)

#7 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:06:22 AM

Posted 03 January 2012 - 08:43 PM

I will await your gmer scan.

#8 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 03 January 2012 - 09:03 PM

It's still running. Thanks for your patience.

#9 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 03 January 2012 - 09:45 PM

ok, the GMER log:


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-01-03 21:43:06
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 SAMSUNG_HD321KJ rev.CP100-12
Running: e4gxnmp2.exe; Driver: C:\DOCUME~1\THEHUN~1\LOCALS~1\Temp\kgrdrpob.sys


---- System - GMER 1.0.15 ----

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwCreateKey [0xB80F887E]
SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwSetValueKey [0xB80F8BFE]
SSDT \??\C:\Documents and Settings\The xxxx Family\Desktop\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xB4042640]

---- Kernel code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB6A4C380, 0x8D6CD5, 0xE8000020]
.text redbook.sys B8159000 2 Bytes [C7, 45]
.text redbook.sys B8159003 25 Bytes JMP B8159243 \SystemRoot\system32\DRIVERS\redbook.sys (Redbook Audio Filter Driver/Microsoft Corporation)
.text redbook.sys B815901D 1 Byte [02]
.text redbook.sys B8159020 81 Bytes [74, 3F, 8B, 55, 10, 83, E2, ...]
.text redbook.sys B8159073 21 Bytes JMP B8159247 \SystemRoot\system32\DRIVERS\redbook.sys (Redbook Audio Filter Driver/Microsoft Corporation)
.text ...
? C:\WINDOWS\system32\DRIVERS\redbook.sys suspicious PE modification

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\System32\svchost.exe[1108] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0193000A
.text C:\WINDOWS\System32\svchost.exe[1108] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 0194000A
.text C:\WINDOWS\System32\svchost.exe[1108] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 0192000C

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

---- Modules - GMER 1.0.15 ----

Module (noname) (*** hidden *** ) B6833000-B684C000 (102400 bytes)

---- Processes - GMER 1.0.15 ----

Process C:\WINDOWS\system32\ping.exe (*** hidden *** ) 2528

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@AppInit_DLLs
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@LoadAppInit_DLLs 1

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB29581$\1838012094 0 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808 0 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\bckfg.tmp 863 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\cfg.ini 197 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\keywords 134 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\kwrd.dll 223744 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\L 0 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\L\moqerpxy 57600 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\lsflt7.ver 5176 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U 0 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U\00000002.@ 224768 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U\00000004.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U\80000000.@ 11264 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U\80000004.@ 12800 bytes
File C:\WINDOWS\$NtUninstallKB29581$\675109808\U\80000032.@ 77312 bytes
File C:\WINDOWS\$NtUninstallKB35954$\4291557088 0 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808 0 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\bckfg.tmp 840 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\cfg.ini 233 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\keywords 120 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\kwrd.dll 208896 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\L 0 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\L\moqerpxy 456320 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\lsflt7.ver 1191 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\U 0 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\U\00000002.@ 209920 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\U\80000000.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB35954$\675109808\U\80000032.@ 71168 bytes

---- EOF - GMER 1.0.15 ----

#10 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:06:22 AM

Posted 03 January 2012 - 09:51 PM

Please follow the instructions in ==>Malware Removal and Log Section Preparation Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include the link to this topic in your new topic and a description of your computer issues and what you have done to resolve them.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Once you have created the new topic, please reply back here with a link to the new topic.

Most importantly please be patient till you get a reply to your topic.

#11 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 03 January 2012 - 11:33 PM

UNable to post in that forum. I'll save it and post tomorrow morning, hopefully. It's way past my bedtime.

#12 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:06:22 AM

Posted 03 January 2012 - 11:43 PM

have a good night. what errors do you get?

#13 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 04 January 2012 - 06:32 PM

The connection was reset







The connection to the server was reset while the page was loading.





The site could be temporarily unavailable or too busy. Try again in a few
moments.
If you are unable to load any pages, check your computer's network
connection.
If your computer or network is protected by a firewall or proxy, make sure
that Firefox is permitted to access the Web.

I still cannot post to that forum again today. :(

#14 Mistyreus

Mistyreus
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:22 AM

Posted 05 January 2012 - 07:27 PM

OK, I'm back in town, is CryptoDan still around to maybe help me with this?

#15 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:06:22 AM

Posted 05 January 2012 - 08:25 PM

Can you upload the files to like http://www.pastebin.com and post the links to the logs that way in the malware topic?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users