Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Norton Error Message about Tidserv Activity 2


  • This topic is locked This topic is locked
11 replies to this topic

#1 tidwd

tidwd

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:33 PM

Posted 28 January 2012 - 07:53 PM

Hello,

I am running Windows XP and have Norton 360 antivirus software. I have received a pop-up message from the Norton program stating "Threat requiring manual removal detected: System Infected: Tidserv Activity 2" There is a link to this page: http://www.symantec.com/security_response/attacksignatures/detail.jsp?lg=en&ct=US&asid=23615 at the bottom of the message.

I have gone the page and followed the instructions there for downloading the removal tool (FixTDSS.exe) and running it. When I run the removal tool (TDSS Fix Tool 2.1.3) it displays this message: “Backdoor.Tidserv has not been found on your computer.”

However, I am still having the same pop-up message from Norton appearing stating that I am still infected. Am I infected or is the Norton program just giving this message in error? How can I make sure that I do not have Tidserv and how can I get the message from Norton to go away?

Thanks for any help you can offer.

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:33 PM

Posted 28 January 2012 - 08:00 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download Farbar Service Scanner and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center
    • Windows Update
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

====================================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
Click the "Scan" button to start scan.
On completion of the scan click "Save log", save it to your desktop and post in your next reply.

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 tidwd

tidwd
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:33 PM

Posted 28 January 2012 - 11:11 PM

Here are the logs:

Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Disabled!
Norton 360
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 22
Java™ 6 Update 3
Out of date Java installed!
Adobe Flash Player ( 10.3.181.34) Flash Player Out of Date!
Mozilla Firefox (3.6.25) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Norton ccSvcHst.exe
``````````End of Log````````````


Farbar Service Scanner Version: 18-01-2012 01
Ran by pick me (administrator) on 28-01-2012 at 19:03:29
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============
wscsvc Service is not running. Checking service configuration:
Checking Start type: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking ImagePath: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking ServiceDll: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking LEGACY_wscsvc: Attention! Unable to open LEGACY_wscsvc\0000 registry key. The key does not exist.


Windows Update:
===========

File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) NetBT(5) PSched(7) SYMTDI(8) Tcpip(3)
0x080000000400000001000000020000000300000008000000050000000600000007000000
IpSec Tag value is correct.

**** End of log ****

MiniToolBox by Farbar Version: 18-01-2012
Ran by pick me (administrator) on 28-01-2012 at 19:08:10
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

Atheros AR5007EG Wireless Network Adapter = Wireless Network Connection (Connected)
Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller = Local Area Connection (Media disconnected)
The following helper DLL cannot be loaded: IFMON.DLL.
The following command was not found: int ip dump.

Windows IP Configuration

Host Name . . . . . . . . . . . . : mini
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Atheros AR5007EG Wireless Network Adapter
Physical Address. . . . . . . . . : 00-22-43-56-FD-C6
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 192.168.2.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.2.1
DHCP Server . . . . . . . . . . . : 192.168.2.1
DNS Servers . . . . . . . . . . . : 192.168.2.1
192.168.2.1
Lease Obtained. . . . . . . . . . : Saturday, January 28, 2012 6:40:59 PM
Lease Expires . . . . . . . . . . : Saturday, February 04, 2012 6:40:59 PM

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Description . . . . . . . . . . . : Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller
Physical Address. . . . . . . . . : 00-23-54-98-BE-8B

Pinging google.com [74.125.127.99] with 32 bytes of data:

Reply from 74.125.127.99: bytes=32 time=16ms TTL=52
Reply from 74.125.127.99: bytes=32 time=18ms TTL=52

Ping statistics for 74.125.127.99:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 16ms, Maximum = 18ms, Average = 17ms

Pinging yahoo.com [209.191.122.70] with 32 bytes of data:

Reply from 209.191.122.70: bytes=32 time=55ms TTL=50
Reply from 209.191.122.70: bytes=32 time=58ms TTL=50

Ping statistics for 209.191.122.70:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 55ms, Maximum = 58ms, Average = 56ms

Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:

Reply from 208.43.87.2: Destination host unreachable.
Reply from 208.43.87.2: Destination host unreachable.

Ping statistics for 208.43.87.2:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 22 43 56 fd c6 ...... Atheros AR5007EG Wireless Network Adapter - Packet Scheduler Miniport
0x3 ...00 23 54 98 be 8b ...... Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.103 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.2.103 192.168.2.103 20
192.168.2.0 255.255.255.0 192.168.2.103 192.168.2.103 25
192.168.2.103 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.2.255 255.255.255.255 192.168.2.103 192.168.2.103 25
224.0.0.0 240.0.0.0 192.168.2.103 192.168.2.103 25
255.255.255.255 255.255.255.255 192.168.2.103 192.168.2.103 1
255.255.255.255 255.255.255.255 192.168.2.103 3 1
Default Gateway: 192.168.2.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [147456] (Apple Inc.)
Catalog9 01 mswsock.dll [File Not found] ()
Catalog9 02 mswsock.dll [File Not found] ()
Catalog9 03 mswsock.dll [File Not found] ()
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 mswsock.dll [File Not found] ()
Catalog9 07 mswsock.dll [File Not found] ()
Catalog9 08 mswsock.dll [File Not found] ()
Catalog9 09 mswsock.dll [File Not found] ()
Catalog9 10 mswsock.dll [File Not found] ()
Catalog9 11 mswsock.dll [File Not found] ()
Catalog9 12 mswsock.dll [File Not found] ()
Catalog9 13 mswsock.dll [File Not found] ()
Catalog9 14 mswsock.dll [File Not found] ()
Catalog9 15 mswsock.dll [File Not found] ()

========================= Event log errors: ===============================

Application errors:
==================
Error: (01/28/2012 06:32:49 PM) (Source: Application Hang) (User: )
Description: Hanging application firefox.exe, version 1.9.2.4363, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 06:31:45 PM) (Source: Application Hang) (User: )
Description: Hanging application firefox.exe, version 1.9.2.4363, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:44:22 PM) (Source: Application Hang) (User: )
Description: Hanging application FixTDSS.exe, version 2.1.3.9, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:44:00 PM) (Source: Application Hang) (User: )
Description: Hanging application FixTDSS.exe, version 2.1.3.9, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:36:39 PM) (Source: .NET Runtime 2.0 Error Reporting) (User: )
Description: EventType clr20r3, P1 jing.exe, P2 2.4.10231.1521, P3 4c6d8494, P4 mscorlib, P5 2.0.0.0, P6 4e154d36, P7 f4f, P8 7, P9 clr20r30, P10 clr20r31.

Error: (01/28/2012 05

Here are the logs:

Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Disabled!
Norton 360
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 22
Java™ 6 Update 3
Out of date Java installed!
Adobe Flash Player ( 10.3.181.34) Flash Player Out of Date!
Mozilla Firefox (3.6.25) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Norton ccSvcHst.exe
``````````End of Log````````````


Farbar Service Scanner Version: 18-01-2012 01
Ran by pick me (administrator) on 28-01-2012 at 19:03:29
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============
wscsvc Service is not running. Checking service configuration:
Checking Start type: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking ImagePath: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking ServiceDll: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking LEGACY_wscsvc: Attention! Unable to open LEGACY_wscsvc\0000 registry key. The key does not exist.


Windows Update:
===========

File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) NetBT(5) PSched(7) SYMTDI(8) Tcpip(3)
0x080000000400000001000000020000000300000008000000050000000600000007000000
IpSec Tag value is correct.

**** End of log ****

MiniToolBox by Farbar Version: 18-01-2012
Ran by pick me (administrator) on 28-01-2012 at 19:08:10
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

Atheros AR5007EG Wireless Network Adapter = Wireless Network Connection (Connected)
Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller = Local Area Connection (Media disconnected)
The following helper DLL cannot be loaded: IFMON.DLL.
The following command was not found: int ip dump.

Windows IP Configuration

Host Name . . . . . . . . . . . . : mini
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Atheros AR5007EG Wireless Network Adapter
Physical Address. . . . . . . . . : 00-22-43-56-FD-C6
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 192.168.2.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.2.1
DHCP Server . . . . . . . . . . . : 192.168.2.1
DNS Servers . . . . . . . . . . . : 192.168.2.1
192.168.2.1
Lease Obtained. . . . . . . . . . : Saturday, January 28, 2012 6:40:59 PM
Lease Expires . . . . . . . . . . : Saturday, February 04, 2012 6:40:59 PM

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Description . . . . . . . . . . . : Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller
Physical Address. . . . . . . . . : 00-23-54-98-BE-8B

Pinging google.com [74.125.127.99] with 32 bytes of data:

Reply from 74.125.127.99: bytes=32 time=16ms TTL=52
Reply from 74.125.127.99: bytes=32 time=18ms TTL=52

Ping statistics for 74.125.127.99:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 16ms, Maximum = 18ms, Average = 17ms

Pinging yahoo.com [209.191.122.70] with 32 bytes of data:

Reply from 209.191.122.70: bytes=32 time=55ms TTL=50
Reply from 209.191.122.70: bytes=32 time=58ms TTL=50

Ping statistics for 209.191.122.70:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 55ms, Maximum = 58ms, Average = 56ms

Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:

Reply from 208.43.87.2: Destination host unreachable.
Reply from 208.43.87.2: Destination host unreachable.

Ping statistics for 208.43.87.2:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 22 43 56 fd c6 ...... Atheros AR5007EG Wireless Network Adapter - Packet Scheduler Miniport
0x3 ...00 23 54 98 be 8b ...... Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.103 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.2.103 192.168.2.103 20
192.168.2.0 255.255.255.0 192.168.2.103 192.168.2.103 25
192.168.2.103 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.2.255 255.255.255.255 192.168.2.103 192.168.2.103 25
224.0.0.0 240.0.0.0 192.168.2.103 192.168.2.103 25
255.255.255.255 255.255.255.255 192.168.2.103 192.168.2.103 1
255.255.255.255 255.255.255.255 192.168.2.103 3 1
Default Gateway: 192.168.2.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [147456] (Apple Inc.)
Catalog9 01 mswsock.dll [File Not found] ()
Catalog9 02 mswsock.dll [File Not found] ()
Catalog9 03 mswsock.dll [File Not found] ()
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 mswsock.dll [File Not found] ()
Catalog9 07 mswsock.dll [File Not found] ()
Catalog9 08 mswsock.dll [File Not found] ()
Catalog9 09 mswsock.dll [File Not found] ()
Catalog9 10 mswsock.dll [File Not found] ()
Catalog9 11 mswsock.dll [File Not found] ()
Catalog9 12 mswsock.dll [File Not found] ()
Catalog9 13 mswsock.dll [File Not found] ()
Catalog9 14 mswsock.dll [File Not found] ()
Catalog9 15 mswsock.dll [File Not found] ()

========================= Event log errors: ===============================

Application errors:
==================
Error: (01/28/2012 06:32:49 PM) (Source: Application Hang) (User: )
Description: Hanging application firefox.exe, version 1.9.2.4363, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 06:31:45 PM) (Source: Application Hang) (User: )
Description: Hanging application firefox.exe, version 1.9.2.4363, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:44:22 PM) (Source: Application Hang) (User: )
Description: Hanging application FixTDSS.exe, version 2.1.3.9, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:44:00 PM) (Source: Application Hang) (User: )
Description: Hanging application FixTDSS.exe, version 2.1.3.9, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:36:39 PM) (Source: .NET Runtime 2.0 Error Reporting) (User: )
Description: EventType clr20r3, P1 jing.exe, P2 2.4.10231.1521, P3 4c6d8494, P4 mscorlib, P5 2.0.0.0, P6 4e154d36, P7 f4f, P8 7, P9 clr20r30, P10 clr20r31.

Error: (01/28/2012 05

#4 tidwd

tidwd
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:33 PM

Posted 28 January 2012 - 11:13 PM

Here are the logs:

Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Disabled!
Norton 360
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 22
Java™ 6 Update 3
Out of date Java installed!
Adobe Flash Player ( 10.3.181.34) Flash Player Out of Date!
Mozilla Firefox (3.6.25) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Norton ccSvcHst.exe
``````````End of Log````````````


Farbar Service Scanner Version: 18-01-2012 01
Ran by pick me (administrator) on 28-01-2012 at 19:03:29
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============
wscsvc Service is not running. Checking service configuration:
Checking Start type: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking ImagePath: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking ServiceDll: Attention! Unable to open wscsvc registry key. The service key does not exist.
Checking LEGACY_wscsvc: Attention! Unable to open LEGACY_wscsvc\0000 registry key. The key does not exist.


Windows Update:
===========

File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) NetBT(5) PSched(7) SYMTDI(8) Tcpip(3)
0x080000000400000001000000020000000300000008000000050000000600000007000000
IpSec Tag value is correct.

**** End of log ****

MiniToolBox by Farbar Version: 18-01-2012
Ran by pick me (administrator) on 28-01-2012 at 19:08:10
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

Atheros AR5007EG Wireless Network Adapter = Wireless Network Connection (Connected)
Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller = Local Area Connection (Media disconnected)
The following helper DLL cannot be loaded: IFMON.DLL.
The following command was not found: int ip dump.

Windows IP Configuration

Host Name . . . . . . . . . . . . : mini
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Atheros AR5007EG Wireless Network Adapter
Physical Address. . . . . . . . . : 00-22-43-56-FD-C6
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 192.168.2.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.2.1
DHCP Server . . . . . . . . . . . : 192.168.2.1
DNS Servers . . . . . . . . . . . : 192.168.2.1
192.168.2.1
Lease Obtained. . . . . . . . . . : Saturday, January 28, 2012 6:40:59 PM
Lease Expires . . . . . . . . . . : Saturday, February 04, 2012 6:40:59 PM

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Description . . . . . . . . . . . : Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller
Physical Address. . . . . . . . . : 00-23-54-98-BE-8B

Pinging google.com [74.125.127.99] with 32 bytes of data:

Reply from 74.125.127.99: bytes=32 time=16ms TTL=52
Reply from 74.125.127.99: bytes=32 time=18ms TTL=52

Ping statistics for 74.125.127.99:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 16ms, Maximum = 18ms, Average = 17ms

Pinging yahoo.com [209.191.122.70] with 32 bytes of data:

Reply from 209.191.122.70: bytes=32 time=55ms TTL=50
Reply from 209.191.122.70: bytes=32 time=58ms TTL=50

Ping statistics for 209.191.122.70:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 55ms, Maximum = 58ms, Average = 56ms

Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:

Reply from 208.43.87.2: Destination host unreachable.
Reply from 208.43.87.2: Destination host unreachable.

Ping statistics for 208.43.87.2:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 22 43 56 fd c6 ...... Atheros AR5007EG Wireless Network Adapter - Packet Scheduler Miniport
0x3 ...00 23 54 98 be 8b ...... Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.103 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.2.103 192.168.2.103 20
192.168.2.0 255.255.255.0 192.168.2.103 192.168.2.103 25
192.168.2.103 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.2.255 255.255.255.255 192.168.2.103 192.168.2.103 25
224.0.0.0 240.0.0.0 192.168.2.103 192.168.2.103 25
255.255.255.255 255.255.255.255 192.168.2.103 192.168.2.103 1
255.255.255.255 255.255.255.255 192.168.2.103 3 1
Default Gateway: 192.168.2.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [147456] (Apple Inc.)
Catalog9 01 mswsock.dll [File Not found] ()
Catalog9 02 mswsock.dll [File Not found] ()
Catalog9 03 mswsock.dll [File Not found] ()
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 mswsock.dll [File Not found] ()
Catalog9 07 mswsock.dll [File Not found] ()
Catalog9 08 mswsock.dll [File Not found] ()
Catalog9 09 mswsock.dll [File Not found] ()
Catalog9 10 mswsock.dll [File Not found] ()
Catalog9 11 mswsock.dll [File Not found] ()
Catalog9 12 mswsock.dll [File Not found] ()
Catalog9 13 mswsock.dll [File Not found] ()
Catalog9 14 mswsock.dll [File Not found] ()
Catalog9 15 mswsock.dll [File Not found] ()

========================= Event log errors: ===============================

Application errors:
==================
Error: (01/28/2012 06:32:49 PM) (Source: Application Hang) (User: )
Description: Hanging application firefox.exe, version 1.9.2.4363, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 06:31:45 PM) (Source: Application Hang) (User: )
Description: Hanging application firefox.exe, version 1.9.2.4363, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:44:22 PM) (Source: Application Hang) (User: )
Description: Hanging application FixTDSS.exe, version 2.1.3.9, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:44:00 PM) (Source: Application Hang) (User: )
Description: Hanging application FixTDSS.exe, version 2.1.3.9, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/28/2012 05:36:39 PM) (Source: .NET Runtime 2.0 Error Reporting) (User: )
Description: EventType clr20r3, P1 jing.exe, P2 2.4.10231.1521, P3 4c6d8494, P4 mscorlib, P5 2.0.0.0, P6 4e154d36, P7 f4f, P8 7, P9 clr20r30, P10 clr20r31.

Error: (01/28/2012 05

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:33 PM

Posted 04 February 2012 - 02:32 PM

It looks like you may have a rootkit,please post the aswMBR log also.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 tidwd

tidwd
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:33 PM

Posted 04 February 2012 - 05:58 PM

So, there was a message from cryptodan asking me to run these scans and report, but now I don't see that in the thread. Here are the logs anyway for mbam, superantispyware, and GMER. At the bottom I've added the aswMBR log you requested, boopme. Since running all these scans, rebooting and re-enabling Norton's autoprotect, I haven't seen the original pop-up warning message from Norton. In addition, google searches had been redirecting, but now they appear to be normal--which seems like a step in the right direction. I still want to make sure everything is completely cleared up though. Let me know if there is anything else I should do at this point. Thanks!

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
pick me :: MINI [administrator]

2/3/2012 11:06:05 PM
mbam-log-2012-02-03 (23-06-05).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 223068
Time elapsed: 1 hour(s), 40 minute(s), 11 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 5
C:\System Volume Information\_restore{70FD1DB3-E30F-48EC-ABEA-2DE81F03A8C6}\RP1\A0001001.sys (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{70FD1DB3-E30F-48EC-ABEA-2DE81F03A8C6}\RP1\A0002001.sys (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{70FD1DB3-E30F-48EC-ABEA-2DE81F03A8C6}\RP1\A0003001.sys (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{70FD1DB3-E30F-48EC-ABEA-2DE81F03A8C6}\RP1\A0004001.sys (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{70FD1DB3-E30F-48EC-ABEA-2DE81F03A8C6}\RP1\A0005001.sys (Trojan.FakeAlert) -> Quarantined and deleted successfully.

(end)

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/04/2012 at 05:59 AM

Application Version : 5.0.1144

Core Rules Database Version : 8203
Trace Rules Database Version: 6015

Scan type : Complete Scan
Total Scan Time : 04:27:46

Operating System Information
Windows XP Home Edition 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 252
Memory threats detected : 0
Registry items scanned : 31341
Registry threats detected : 6
File items scanned : 63993
File threats detected : 389

Adware.Tracking Cookie
C:\Documents and Settings\pick me\Cookies\pick_me@imrworldwide[2].txt [ /imrworldwide ]
C:\Documents and Settings\pick me\Cookies\pick_me@www.windowsmedia[2].txt [ /www.windowsmedia ]
C:\Documents and Settings\pick me\Cookies\S2C1BV7G.txt [ /ads.undertone.com ]
C:\Documents and Settings\pick me\Cookies\68C94F4O.txt [ /andomedia.com ]
C:\Documents and Settings\pick me\Cookies\OACNNXTH.txt [ /pointroll.com ]
C:\Documents and Settings\pick me\Cookies\BJRD71CX.txt [ /adxpose.com ]
C:\Documents and Settings\pick me\Cookies\6RKKK5GB.txt [ /media6degrees.com ]
C:\Documents and Settings\pick me\Cookies\7U5P9ET9.txt [ /invitemedia.com ]
C:\Documents and Settings\pick me\Cookies\P238E52S.txt [ /a1.interclick.com ]
C:\Documents and Settings\pick me\Cookies\VDLU61M8.txt [ /accounts.google.com ]
C:\Documents and Settings\pick me\Cookies\R2YLGTAN.txt [ /interclick.com ]
C:\Documents and Settings\pick me\Cookies\DEC2QLYR.txt [ /kingcounty.gov ]
C:\Documents and Settings\pick me\Cookies\QSDYMKMH.txt [ /legolas-media.com ]
C:\Documents and Settings\pick me\Cookies\QKAL5TL8.txt [ /metro.kingcounty.gov ]
C:\Documents and Settings\pick me\Cookies\WM064RBK.txt [ /ad.wsod.com ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\F5BTDG83.txt [ Cookie:system@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IKCJ684J.txt [ Cookie:system@ads.gamersmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YH2PUKE9.txt [ Cookie:system@geltmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\K3BCMK8G.txt [ Cookie:system@seek-more.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\7XYV5B7X.txt [ Cookie:system@bestneighborhoodsearch.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\PNZDVED1.txt [ Cookie:system@dmtracker.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KJ7IQW7W.txt [ Cookie:system@ox-d.enveromedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5SJ50NRB.txt [ Cookie:system@bluesearchlocal.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0H1TU4K1.txt [ Cookie:system@ar.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\P33BXNCW.txt [ Cookie:system@clicks.geltmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6G0AQ0TR.txt [ Cookie:system@goclicker.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\38SDIAEZ.txt [ Cookie:system@eas.apm.emediate.eu/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\B3W5PSMA.txt [ Cookie:system@atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LT11B1AC.txt [ Cookie:system@trafficno.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\R51SYD44.txt [ Cookie:system@klpfind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NXJ4RFAR.txt [ Cookie:system@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BLJ9Q9PE.txt [ Cookie:system@usabarfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\J40VHSOY.txt [ Cookie:system@eclickz.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\XP2PLQN8.txt [ Cookie:system@bluesearchonline.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\UFPBEB7M.txt [ Cookie:system@eyewonder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2WQCEVLS.txt [ Cookie:system@lucidmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MKIFI804.txt [ Cookie:system@ggpublishing.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BXQ3D1WT.txt [ Cookie:system@clicks.thespecialsearch.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LEXIW9OB.txt [ Cookie:system@bestsitesearch.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EXSPR5WD.txt [ Cookie:system@network.realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\L3AIV04Q.txt [ Cookie:system@trafficmp.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\3IWPODQI.txt [ Cookie:system@onlineeasysearch.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6VSU8LHS.txt [ Cookie:system@search.eclickz.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1A8NTJ3Z.txt [ Cookie:system@realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\TJGWP5NM.txt [ Cookie:system@cleangreenfind.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\68ALH1QI.txt [ Cookie:system@mifind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\91X9PC5D.txt [ Cookie:system@seek-your.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LUQD8I6N.txt [ Cookie:system@histats.com/stats/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GIULRM1K.txt [ Cookie:system@burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0B6J69HZ.txt [ Cookie:system@adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HN1F1HOA.txt [ Cookie:system@www.usabarfinder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EISEEYD2.txt [ Cookie:system@yieldmanager.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EKG84LIK.txt [ Cookie:system@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GZZE1098.txt [ Cookie:system@adup.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2AXMN55W.txt [ Cookie:system@seek-media.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1X4T8XAJ.txt [ Cookie:system@crackle.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9W880LUA.txt [ Cookie:system@zero-seek.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Q0INC3D0.txt [ Cookie:system@ad2.adfarm1.adition.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VK4PBYIQ.txt [ Cookie:system@great-deal-find.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ML35YF6E.txt [ Cookie:system@sadsearch.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\A2Z6UCRQ.txt [ Cookie:system@boom-find.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\XTD5IRZW.txt [ Cookie:system@entrepreneur.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GJP26R9Z.txt [ Cookie:system@bizzclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LUN67JQW.txt [ Cookie:system@come-find.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\RLI9C2DJ.txt [ Cookie:system@filter.plusfind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\X7LCBHFF.txt [ Cookie:system@r1-ads.ace.advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\7L1JW4QI.txt [ Cookie:system@smashfind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\X671DCOD.txt [ Cookie:system@findstops.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EYXNNV42.txt [ Cookie:system@247realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Y5D9VRSP.txt [ Cookie:system@xml.trafficengine.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\V6W5P6UE.txt [ Cookie:system@smartadserver.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\S52H6ICG.txt [ Cookie:system@redseekmedia.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\UJGT3JXW.txt [ Cookie:system@lokyfind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0ALQCGRH.txt [ Cookie:system@adtech.de/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NX4XEWMS.txt [ Cookie:system@cdn.jemamedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\UTKOFMPW.txt [ Cookie:system@histats.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\OY9PA336.txt [ Cookie:system@gotta-get.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9EET0VDP.txt [ Cookie:system@yadro.ru/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GASXM3R9.txt [ Cookie:system@content.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\3YTRO9L1.txt [ Cookie:system@clickbooth.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\QJZLVC03.txt [ Cookie:system@city-seek.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5LFYU2JY.txt [ Cookie:system@youngbucks.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\75BILAR2.txt [ Cookie:system@greensearchsquad.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0GU437H7.txt [ Cookie:system@findology.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0JSAOHYX.txt [ Cookie:system@stat.onestat.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KTK2QRMW.txt [ Cookie:system@fromtofind.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\S5K0XCHC.txt [ Cookie:system@myroitracking.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\QY86BKDH.txt [ Cookie:system@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\D90F6VVV.txt [ Cookie:system@akamai.interclickproxy.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EERN0C59.txt [ Cookie:system@rotator.adjuggler.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\110IJH8I.txt [ Cookie:system@adsonar.com/adserving ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KL95I8H8.txt [ Cookie:system@perfectsearchengine.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\169H1XC2.txt [ Cookie:system@adinterax.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IJ3S53DX.txt [ Cookie:system@kanoodle.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9YGHH86M.txt [ Cookie:system@xml.prostreammedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\8BCJJ251.txt [ Cookie:system@amazon-adsystem.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0TA644X9.txt [ Cookie:system@oceanbluesearch.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LSDQOY2X.txt [ Cookie:system@uiadserver.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MVHKD5Z4.txt [ Cookie:system@adserver2.eclickz.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\L84F5CIY.txt [ Cookie:system@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CKM2GI7N.txt [ Cookie:system@giftscom.122.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\UDVD1X8S.txt [ Cookie:system@ox-d.fondnessmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\E3VMLQWC.txt [ Cookie:system@bs.serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\DJPOJA27.txt [ Cookie:system@media.withamymac.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\M8K47I5Q.txt [ Cookie:system@liveperson.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VOGZ61KD.txt [ Cookie:system@adserver.adtechus.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1TDQNCOZ.txt [ Cookie:system@tag.2bluemedia.hiro.tv/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VJU581GA.txt [ Cookie:system@server.cpmstar.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\CMKZSJG3.txt [ Cookie:system@lookgreatsearch.com/click/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\8P3IMPIZ.txt [ Cookie:system@kontera.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\4YA5BY6U.txt [ Cookie:system@mtvn.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YBYHPK99.txt [ Cookie:system@banners.trafficengine.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BA1OVD54.txt [ Cookie:system@content.yieldmanager.com/ak/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KF1R9JCC.txt [ Cookie:system@easysearchsite.com/click/ ]
C:\DOCUMENTS AND SETTINGS\PICK ME\Cookies\C7VKROX0.txt [ Cookie:pick me@google.com/accounts/ ]
C:\DOCUMENTS AND SETTINGS\PICK ME\Cookies\MQM7H73P.txt [ Cookie:pick me@www.google.com/accounts ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
content.yieldmanager.edgesuite.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
crackle.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
i.adultswim.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
media.heavy.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
tag.2bluemedia.hiro.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GJC23927 ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
ads1.msn.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
broadcast.piximedia.fr [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
cdn4.specificclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
convoad.technoratimedia.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
crackle.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
ds.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
ec.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
googleads.g.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
ia.media-imdb.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
m1.2mdn.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
m1.emea.2mdn.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
macromedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
media.hamptonroads.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
media.king5.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
media.mtvnservices.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
media.scanscout.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
media.theonion.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
media.zipcar.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
msnbcmedia.msn.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
msntest.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
securityclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
spe.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
static.2mdn.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
udn.specificclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
www.naiadsystems.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
www.nakedsword.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\UZ2NWTL9 ]
.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.kingcounty.gov [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.kingcounty.gov [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.specificmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.eyewonder.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
dc.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
in.getclicky.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.intermundomedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media6degrees.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.lucidmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.metro.kingcounty.gov [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.metro.kingcounty.gov [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adxpose.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mediabrandsww.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
eas.apm.emediate.eu [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.lfstmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.lucidmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ads.vclick.vn [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.harrenmedianetwork.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
wstat.wibiya.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
accounts.youtube.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mm.chitika.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mmstat.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.getclicky.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.static.getclicky.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.steelhousemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.steelhousemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.clickfuse.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
eas.apm.emediate.eu [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
eas.apm.emediate.eu [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.amazon-adsystem.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.eyewonder.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.mynortonaccount.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.mynortonaccount.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mynortonaccount.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mynortonaccount.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
account.norton.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.account.norton.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.account.norton.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
account.norton.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
account.norton.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
account.norton.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.amazon-adsystem.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.viewablemedia.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.andomedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mediapromoter.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mediapromoter.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.thefind.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.thefind.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.thefind.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.thefind.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
mediaservices-d.openxenterprise.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
adserver.valwa.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wbmyomajchp.stats.esomniture.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.dealtime.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.discountwomensdressshoes.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.discountwomensdressshoes.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.discountwomensdressshoes.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.discountwomensdressshoes.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.discountwomensdressshoes.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
a.intentmedia.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
a.intentmedia.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.citygridmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.martiniadnetwork.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.martiniadnetwork.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.martiniadnetwork.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.trackalyzer.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.game-advertising-online.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.account.edfinancial.comservicing.org [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.account.edfinancial.comservicing.org [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
account.edfinancial.comservicing.org [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.clickbooth.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.accounts.google.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.akamai.interclickproxy.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ads.saymedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ads.saymedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.technoratimedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
optimize.indieclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
optimize.indieclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
optimize.indieclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media2.legacy.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media.adfrontiers.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.media.adfrontiers.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.c.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.c.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.pro-market.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.pro-market.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.pro-market.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.pro-market.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adserver.adtechus.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.realmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.traveladvertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.traveladvertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.www.burstnet.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.realmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.trafficmp.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.trafficmp.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.trafficmp.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.nextag.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.nextag.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.tribalfusion.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adbrite.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.yieldmanager.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.overture.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.overture.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.burstnet.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.burstnet.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.r1-ads.ace.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.247realmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.dominionenterprises.112.2o7.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ru4.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.pro-market.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.tacoda.at.atwola.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ar.atwola.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.lfstmedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.adserver.adtechus.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.specificclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.solvemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.solvemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.solvemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.casalemedia.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.fastclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.fastclick.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.apmebf.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mediaplex.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.mediaplex.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
ads2.iweb.cortica.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.zedo.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
bridge2.admarketplace.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.admarketplace.net [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]
.bizzclick.com [ C:\DOCUMENTS AND SETTINGS\PICK ME\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\QPC8JFVU.DEFAULT\COOKIES.SQLITE ]

Trojan.Agent/Gen-FraudScan[Prod]
HKLM\System\ControlSet001\Services\MRXSMB
C:\WINDOWS\SYSTEM32\DRIVERS\MRXSMB.SYS
HKLM\System\ControlSet001\Enum\Root\LEGACY_MRXSMB
HKLM\System\ControlSet003\Services\MRXSMB
HKLM\System\ControlSet003\Enum\Root\LEGACY_MRXSMB
HKLM\System\CurrentControlSet\Services\MRXSMB
HKLM\System\CurrentControlSet\Enum\Root\LEGACY_MRXSMB


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-02-04 13:09:55
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST9160310AS rev.0303
Running: 8i651uf2.exe; Driver: C:\DOCUME~1\PICKME~1\LOCALS~1\Temp\pxtdypod.sys


---- System - GMER 1.0.15 ----

SSDT 86342DD0 ZwAlertResumeThread
SSDT 85D8F218 ZwAlertThread
SSDT 85CDC7B8 ZwAllocateVirtualMemory
SSDT 85D4ADD0 ZwAssignProcessToJobObject
SSDT 861F1ED8 ZwConnectPort
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwCreateKey [0xA5430710]
SSDT 85CA3210 ZwCreateMutant
SSDT 85D8BA50 ZwCreateSymbolicLinkObject
SSDT 861DA078 ZwCreateThread
SSDT 85D35B78 ZwDebugActiveProcess
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteKey [0xA5430990]
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xA5430EF0]
SSDT 85C9AD50 ZwDuplicateObject
SSDT 85D171C0 ZwFreeVirtualMemory
SSDT 85CA3300 ZwImpersonateAnonymousToken
SSDT 86342D10 ZwImpersonateThread
SSDT 86128568 ZwLoadDriver
SSDT 85A9E0B0 ZwMapViewOfSection
SSDT 861297D0 ZwOpenEvent
SSDT 85CD9368 ZwOpenProcess
SSDT 85E743E0 ZwOpenProcessToken
SSDT 85CFA9F0 ZwOpenSection
SSDT 8636C568 ZwOpenThread
SSDT 85D4ACE0 ZwProtectVirtualMemory
SSDT 85D8F2B8 ZwResumeThread
SSDT 861DDD20 ZwSetContextThread
SSDT 85D50148 ZwSetInformationProcess
SSDT 85D35C38 ZwSetSystemInformation
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xA5431140]
SSDT 86129710 ZwSuspendProcess
SSDT 85D2CD68 ZwSuspendThread
SSDT 86342778 ZwTerminateProcess
SSDT 860B5C28 ZwTerminateThread
SSDT 85D50218 ZwUnmapViewOfSection
SSDT 85D61458 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

? SYMDS.SYS The system cannot find the file specified. !
? SYMEFA.SYS The system cannot find the file specified. !

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB61936$\2413133349 0 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\bckfg.tmp 854 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\cfg.ini 93 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\keywords 84 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\kwrd.dll 223744 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\L 0 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\L\rgiienwb 456320 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\oemid 73 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U 0 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U\00000002.@ 224768 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U\00000004.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U\80000000.@ 11264 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U\80000004.@ 12800 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\U\80000032.@ 73216 bytes
File C:\WINDOWS\$NtUninstallKB61936$\2413133349\version 858 bytes
File C:\WINDOWS\$NtUninstallKB61936$\47856919 0 bytes

---- EOF - GMER 1.0.15 ----


aswMBR version 0.9.9.1532 Copyright© 2011 AVAST Software
Run date: 2012-01-28 19:39:43
-----------------------------
19:39:43.812 OS Version: Windows 5.1.2600 Service Pack 3
19:39:43.812 Number of processors: 2 586 0x1C02
19:39:43.812 ComputerName: MINI UserName:
19:39:48.187 Initialize success
19:45:16.375 AVAST engine defs: 12012801
19:45:32.921 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
19:45:32.937 Disk 0 Vendor: ST9160310AS 0303 Size: 152627MB BusType: 3
19:45:32.968 Disk 0 MBR read successfully
19:45:32.984 Disk 0 MBR scan
19:45:33.187 Disk 0 Windows XP default MBR code
19:45:33.218 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 81909 MB offset 63
19:45:33.265 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 62667 MB offset 167750730
19:45:33.343 Disk 0 Partition 3 00 1C Hidd FAT32 LBA MSDOS5.0 8008 MB offset 296094015
19:45:33.562 Disk 0 Partition 4 00 EF EFI FAT B 39 MB offset 312496380
19:45:33.578 Disk 0 scanning sectors +312576705
19:45:33.703 Disk 0 scanning C:\WINDOWS\system32\drivers
19:45:42.093 File: C:\WINDOWS\system32\drivers\mrxsmb.sys **INFECTED** Win32:Downloader-MPH [Trj]
19:45:51.671 Disk 0 trace - called modules:
19:45:52.062
19:45:55.359 AVAST engine scan C:\WINDOWS
19:46:18.828 AVAST engine scan C:\WINDOWS\system32
19:51:57.375 AVAST engine scan C:\WINDOWS\system32\drivers
19:52:04.140 File: C:\WINDOWS\system32\drivers\mrxsmb.sys **INFECTED** Win32:Downloader-MPH [Trj]
19:52:19.843 AVAST engine scan C:\Documents and Settings\pick me
19:56:16.312 File: C:\Documents and Settings\pick me\Desktop\papers\Documents from Desktop PC\security\illegal_adv_uninstall.exe **INFECTED** Win32:Adware-gen [Adw]
20:02:42.859 AVAST engine scan C:\Documents and Settings\All Users
20:05:11.453 Scan finished successfully
20:06:12.546 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\pick me\Desktop\MBR.dat"
20:06:12.656 The log file has been saved successfully to "C:\Documents and Settings\pick me\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1532 Copyright© 2011 AVAST Software
Run date: 2012-02-04 14:13:57
-----------------------------
14:13:57.937 OS Version: Windows 5.1.2600 Service Pack 3
14:13:57.937 Number of processors: 2 586 0x1C02
14:13:57.937 ComputerName: MINI UserName:
14:14:13.500 Initialize success
14:26:21.968 AVAST engine defs: 12020401
14:26:35.843 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
14:26:35.843 Disk 0 Vendor: ST9160310AS 0303 Size: 152627MB BusType: 3
14:26:35.875 Disk 0 MBR read successfully
14:26:35.875 Disk 0 MBR scan
14:26:36.015 Disk 0 Windows XP default MBR code
14:26:36.031 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 81909 MB offset 63
14:26:36.062 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 62667 MB offset 167750730
14:26:36.109 Disk 0 Partition 3 00 1C Hidd FAT32 LBA MSDOS5.0 8008 MB offset 296094015
14:26:36.140 Disk 0 Partition 4 00 EF EFI FAT B 39 MB offset 312496380
14:26:36.171 Disk 0 scanning sectors +312576705
14:26:36.359 Disk 0 scanning C:\WINDOWS\system32\drivers
14:27:07.953 Service scanning
14:27:12.250 Modules scanning
14:27:48.703 Disk 0 trace - called modules:
14:27:48.734 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys
14:27:48.734 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86512ab8]
14:27:48.734 3 CLASSPNP.SYS[f75c8fd7] -> nt!IofCallDriver -> \Device\0000006f[0x865c79e8]
14:27:48.734 5 ACPI.sys[f745f620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x865c8940]
14:27:50.718 AVAST engine scan C:\
14:35:10.843 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\pick me\Desktop\MBR.dat"
14:35:10.937 The log file has been saved successfully to "C:\Documents and Settings\pick me\Desktop\aswMBR.txt"

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:33 PM

Posted 04 February 2012 - 06:02 PM

Download Bootkit Remover to your Desktop.

  • Unzip downloaded file to your Desktop.
  • Double-click on boot_cleaner.exe to run the program (Vista/7 users,right click on boot_cleaner.exe and click Run As Administrator).
  • It will show a Black screen with some data on it.
  • Right click on the screen and click Select All.
  • Press CTRL+C
  • Open a Notepad and press CTRL+V
  • Post the output back here.

===============================================================

Please download and run ListParts by Farbar (for 32-bit system)

Please download and run ListParts64 by Farbar (for 64-bit system)

Click on Scan button.

Scan result will open in Notepad.
Post it in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#8 tidwd

tidwd
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:33 PM

Posted 04 February 2012 - 06:58 PM

Bootkit Remover
© 2009 Esage Lab
www.esagelab.com

Program version: 1.2.0.1
OS Version: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)

System volume is \\.\C:
\\.\C: -> \\.\PhysicalDrive0 at offset 0x00000000`00007e00
Boot sector MD5 is: 6def5ffcbcdbdb4082f1015625e597bd

Size Device Name MBR Status
--------------------------------------------
149 GB \\.\PhysicalDrive0 OK (DOS/Win32 Boot code found)


Done;
Press any key to quit...



ListParts by Farbar
Ran by pick me on 04-02-2012 at 15:56:23
Windows XP (X86)
Running From: C:\Documents and Settings\pick me\My Documents\Downloads
************************************************************

========================= Memory info ======================

Percentage of memory in use: 78%
Total physical RAM: 1015.17 MB
Available physical RAM: 215.62 MB
Total Pagefile: 2439.54 MB
Available Pagefile: 1731.59 MB
Total Virtual: 2047.88 MB
Available Virtual: 2000.01 MB

======================= Partitions =========================

1 Drive c: () (Fixed) (Total:79.99 GB) (Free:49.49 GB) NTFS ==>[Drive with boot components (Windows XP)]
2 Drive d: () (Fixed) (Total:61.2 GB) (Free:60.81 GB) NTFS

Disk ### Status Size Free Dyn Gpt
-------- ---------- ------- ------- --- ---
Disk 0 Online 149 GB 0 B

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 80 GB 32 KB
Partition 2 Primary 61 GB 80 GB
Partition 3 Unknown 8009 MB 141 GB
Partition 4 Unknown 39 MB 149 GB

Disk: 0
Partition 1
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 0 C NTFS Partition 80 GB Healthy System (partition with boot components)

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No
Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 D NTFS Partition 61 GB Healthy

Disk: 0
Partition 3
Type : 1C
Hidden: Yes
Active: No
There is no volume associated with this partition.

Disk: 0
Partition 4
Type : EF
Hidden: Yes
Active: No
There is no volume associated with this partition.


****** End Of Log ******

#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:33 PM

Posted 04 February 2012 - 07:13 PM

Some more advanced tool swill be needed to take a look at your computer.

Please follow the instructions in ==>This Guide<== starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:33 PM

Posted 04 February 2012 - 08:03 PM

Please include the GMER and aswMBR logs posted above,thanks.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 tidwd

tidwd
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:33 PM

Posted 05 February 2012 - 12:36 AM

I have posted to the other forum here:http://www.bleepingcomputer.com/forums/topic441389.html.

Thanks for the help thus far.

#12 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,994 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:05:33 PM

Posted 05 February 2012 - 01:06 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/topic441389.html you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users