Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Zugo & 6 Trojans found on ESET scan


  • This topic is locked This topic is locked
13 replies to this topic

#1 mill1234

mill1234

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 03 February 2012 - 05:45 PM

Hi,


I've problems with my computer for around a week, this is when a McAfee scan I ran detected 2 trojans and removed them.

Then the problems started:

Unable to start.
Display flashing red & green lines.
Nvidia display driver stops working before and after scan.
Asks to do Startup repair, which can't find the solution.
Recommends contacting manufacturer.
Received BSOD with nvidia display driver file as cause.

Antivirus isn't installed. Believe firewall is on. Bittorrent is installed.

Another person recomended doing an ESET scan, and log is below.

ESET scan is below.

C:\Downloads\ytconverter_cmytube.exe Win32/Toolbar.Zugo application deleted - quarantined
C:\Users\tom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GFRO20XT\jqcwjtfzjrxlet[1].pdf JS/Exploit.Pdfka.PGF.Gen trojan cleaned by deleting - quarantined
C:\Users\tom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\tom\Desktop\0.2774421175425068.exe a variant of Win32/Injector.NGY trojan cleaned by deleting - quarantined
C:\Users\tom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\tom\Desktop\0.579696599774577f.exe a variant of Win32/Injector.NGY trojan cleaned by deleting - quarantined
C:\Users\tom\AppData\Local\Temp\Low\kna0.03762813029996037.exe Win32/Delf.QMF trojan cleaned by deleting - quarantined
C:\Users\tom\AppData\Local\Temp\Low\sghj0.6808059319119277.exe Win32/Delf.QMF trojan cleaned by deleting - quarantined
C:\Users\tom\AppData\Local\Temp\Low\sooi832.bin\CA0A49820B9.exe a variant of Win32/Kryptik.WSG trojan cleaned by deleting - quarantined

Due to the possibily of PC still being infected, please help me ensure my PC is clean!

Thank you

Regards,
mill1234

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 AM

Posted 03 February 2012 - 07:49 PM

Hello, there is a high probability that what you downloade thru bittorrent has put all the infections on here.

Well lets see what is may be going on.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices
  • List Users, Partitions and Memory size.
  • List Minidump Files
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.


Reboot into Safe Mode with Networking
How to enter safe mode(XP/Vista)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode with Networking using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.


>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.


Run RKill....


Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.



Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now reboot to Normal and run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware

Please ask any needed questions,post logs and Let us know how the PC is running now.
Note: When using "Reset FF Proxy Settings" option Firefox should be closed.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 04:23 AM

Hello Boopme, thank you very much for your reply.

I am not very good with computers, and was recommended to this site by a 'Malware junior' (or something like that) who I know.

I have just woken up, so will get the information to you asap.

First log;

MiniToolBox by Farbar Version: 18-01-2012
Ran by tom (administrator) on 04-02-2012 at 09:11:13
Microsoft® Windows Vista™ Home Premium Service Pack 1 (X86)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================


"Reset FF Proxy Settings": Firefox Proxy settings were reset.

========================= Hosts content: =================================

::1 localhost






127.0.0.1 localhost

========================= IP Configuration: ================================

Intel® PRO/Wireless 3945ABG Network Connection = Wireless Network Connection (Connected)
Marvell Yukon 88E8055 PCI-E Gigabit Ethernet Controller = Local Area Connection (Media disconnected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : rpc-tjm25
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Broadcast
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Marvell Yukon 88E8055 PCI-E Gigabit Ethernet Controller
Physical Address. . . . . . . . . : 00-13-A9-E3-7F-46
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel® PRO/Wireless 3945ABG Network Connection
Physical Address. . . . . . . . . : 00-1B-77-4C-47-8D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 192.168.0.103(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : 04 February 2012 09:06:26
Lease Expires . . . . . . . . . . : 11 February 2012 09:06:31
Default Gateway . . . . . . . . . : 192.168.0.1
DHCP Server . . . . . . . . . . . : 192.168.0.1
DNS Servers . . . . . . . . . . . : 192.168.0.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{C927AE53-1091-40BB-97AE-BF9FAD2E51E8}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 9:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 10:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{E41D7A99-7D3F-469F-B589-BD87931F8545}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 14:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{E41D7A99-7D3F-469F-B589-BD87931F8545}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 17:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 18:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 21:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #4
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: dir-615
Address: 192.168.0.1

Name: google.com
Addresses: 209.85.229.105
209.85.229.99
209.85.229.104
209.85.229.147
209.85.229.103



Pinging google.com [209.85.229.147] with 32 bytes of data:

Reply from 209.85.229.147: bytes=32 time=29ms TTL=50

Reply from 209.85.229.147: bytes=32 time=28ms TTL=50



Ping statistics for 209.85.229.147:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 28ms, Maximum = 29ms, Average = 28ms

Server: dir-615
Address: 192.168.0.1

Name: yahoo.com
Addresses: 98.139.180.149
209.191.122.70
72.30.2.43
98.137.149.56



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:

Reply from 209.191.122.70: bytes=32 time=179ms TTL=48

Reply from 209.191.122.70: bytes=32 time=170ms TTL=48



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 170ms, Maximum = 179ms, Average = 174ms

Server: dir-615
Address: 192.168.0.1

Name: bleepingcomputer.com
Address: 208.43.87.2



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:

Reply from 208.43.87.2: Destination host unreachable.

Reply from 208.43.87.2: Destination host unreachable.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
9 ...00 13 a9 e3 7f 46 ...... Marvell Yukon 88E8055 PCI-E Gigabit Ethernet Controller
8 ...00 1b 77 4c 47 8d ...... Intel® PRO/Wireless 3945ABG Network Connection
1 ........................... Software Loopback Interface 1
13 ...00 00 00 00 00 00 00 e0 isatap.{C927AE53-1091-40BB-97AE-BF9FAD2E51E8}
10 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
14 ...00 00 00 00 00 00 00 e0 isatap.{E41D7A99-7D3F-469F-B589-BD87931F8545}
22 ...00 00 00 00 00 00 00 e0 isatap.{E41D7A99-7D3F-469F-B589-BD87931F8545}
20 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
21 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
31 ...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.103 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.0.0 255.255.255.0 On-link 192.168.0.103 281
192.168.0.103 255.255.255.255 On-link 192.168.0.103 281
192.168.0.255 255.255.255.255 On-link 192.168.0.103 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.0.103 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.0.103 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
1 306 ::1/128 On-link
1 306 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\system32\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\system32\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\System32\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\System32\winrnr.dll [19968] (Microsoft Corporation)
Catalog5 07 C:\Program Files\Bonjour\mdnsNSP.dll [152864] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 21 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 22 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 23 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 24 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 25 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 26 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 27 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 28 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 29 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 30 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (02/03/2012 10:20:14 PM) (Source: EventSystem) (User: )
Description: d:\vistasp1_gdr\com\complus\src\events\tier1\eventsystemobj.cpp458007043c

Error: (02/03/2012 07:26:15 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.19088, time stamp 0x4de07b1b, faulting module swg.dll_unloaded, version 0.0.0.0, time stamp 0x4e9e0abd, exception code 0xc0000005, fault offset 0x6b4fb022,
process id 0x12ec, application start time 0xiexplore.exe0.

Error: (02/03/2012 06:16:17 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: -528

Error: (02/03/2012 06:16:17 PM) (Source: ESENT) (User: )
Description: Catalog Database (1716) Catalog Database: Error -1811 occurred while opening logfile C:\Windows\system32\CatRoot2\edb001CF.log.

Error: (01/31/2012 11:31:12 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE ANTIVIRUS PLUS.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (01/31/2012 11:31:12 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE ANTIVIRUS PLUS.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (01/31/2012 11:31:12 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE ANTIVIRUS PLUS.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (01/31/2012 11:31:12 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE ANTIVIRUS PLUS.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (01/31/2012 11:31:12 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE ANTIVIRUS PLUS.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (01/31/2012 11:31:12 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE ANTIVIRUS PLUS.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)


System errors:
=============
Error: (12/07/2009 07:31:23 PM) (Source: EventLog) (User: )
Description: The previous system shutdown at 19:29:34 on 07/12/2009 was unexpected.

Error: (12/07/2009 07:06:19 PM) (Source: Service Control Manager) (User: )
Description: Symantec V2i Mount Driver%%2

Error: (12/07/2009 07:06:19 PM) (Source: Service Control Manager) (User: )
Description: Norton Save and Restore%%1053

Error: (12/07/2009 07:06:19 PM) (Source: Service Control Manager) (User: )
Description: 30000Norton Save and Restore

Error: (12/07/2009 07:06:19 PM) (Source: Service Control Manager) (User: )
Description: Parallel port driver%%1058

Error: (12/07/2009 07:04:43 PM) (Source: HTTP) (User: )
Description: \Device\Http\ReqQueueKerberos

Error: (12/07/2009 08:00:05 AM) (Source: Service Control Manager) (User: )
Description: Symantec V2i Mount Driver%%2

Error: (12/07/2009 08:00:05 AM) (Source: Service Control Manager) (User: )
Description: Norton Save and Restore%%1053

Error: (12/07/2009 08:00:05 AM) (Source: Service Control Manager) (User: )
Description: 30000Norton Save and Restore

Error: (12/07/2009 08:00:05 AM) (Source: Service Control Manager) (User: )
Description: Parallel port driver%%1058


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

Update for Microsoft Office 2007 (KB2508958)
4oD (Version: 2.0.23.0)
ABBYY FineReader 6.0 Sprint (Version: 6.00.1784.41616)
Activation Assistant for the 2007 Microsoft Office suites
Activation Assistant for the 2007 Microsoft Office suites (Version: 1.0)
Adobe Flash Player 11 ActiveX (Version: 11.1.102.55)
Adobe Reader 8.1.2 (Version: 8.1.2)
Adobe Shockwave Player 11.5 (Version: 11.5.9.620)
Alarm (Version: 2.0.5)
Apple Application Support (Version: 1.3.0)
Apple Mobile Device Support (Version: 3.1.0.62)
Apple Software Update (Version: 2.1.1.116)
AppMon Utility (Version: 2.1.00.04120)
AVG 2012 (Version: 12.0.1873)
AVG 2012 (Version: 12.0.2102)
AVG 2012 (Version: 2012.0.1873)
BitComet 1.03 (Version: 1.03)
Bonjour (Version: 2.0.2.0)
Browser Address Error Redirector
Click to DVD 2.0.05 Menu Data (Version: 2.0.05)
Click to DVD 2.6.00 (Version: 2.6.00)
Dell AIO 810
Dell PC Fax
DivX Setup (Version: 2.0.4.2)
DSD Direct (Version: 2.0.01)
DSD Playback Plug-in (Version: 1.1)
EPSON-Drucker-Software
ESET Online Scanner v3
Favorit
FinePixViewer Resource
FinePixViewer Ver.5.1
GearDrvs (Version: 1.00.0000)
Google Chrome (Version: 16.0.912.77)
Google Earth (Version: 4.2.181.2634)
Google Talk (remove only)
Google Toolbar for Internet Explorer (Version: 1.0.0)
Google Toolbar for Internet Explorer (Version: 7.2.2318.1946)
Google Update Helper (Version: 1.3.21.99)
HDAUDIO SoftV92 Data Fax Modem with SmartCP
Intel® Matrix Storage Manager
iTunes (Version: 9.2.1.5)
Java™ SE Runtime Environment 6 (Version: 1.6.0.0)
K-Lite Codec Pack 2.76 Full (Version: 2.76)
MATLAB Family of Products Release 14
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Office 2007 Service Pack 2 (SP2)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Home and Student 2007 (Version: 12.0.6425.1000)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Silverlight (Version: 4.0.60831.0)
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Express Edition (VAIO_VEDB) (Version: 9.4.5000.00)
Microsoft SQL Server Native Client (Version: 9.00.5000.00)
Microsoft SQL Server Setup Support Files (English) (Version: 9.00.5000.00)
Microsoft SQL Server VSS Writer (Version: 9.00.5000.00)
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Works (Version: 08.05.0818)
Monopoly Deluxe (Version: 1.0.0)
MSXML 4.0 SP2 (KB927978) (Version: 4.20.9841.0)
MSXML 4.0 SP2 (KB936181) (Version: 4.20.9848.0)
MSXML 4.0 SP2 (KB941833) (Version: 4.20.9849.0)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
Nero 7 Premium (Version: 7.02.9753)
neroxml (Version: 1.0.0)
Norton 360 (Version: 5.1.0.29)
NVIDIA Drivers
OpenMG Limited Patch 4.7-07-13-24-01
OpenMG Secure Module 4.7.00 (Version: 4.7.00.12140)
Picasa 2 (Version: 2.0)
Premier Manager 09 (Version: 1.00.0000)
Pro Evolution Soccer 2008 (Version: 1.00.0000)
QuickTime (Version: 7.66.73.0)
R for Windows 2.6.1 (Version: 2.6.1)
RAW FILE CONVERTER LE
Real Alternative 1.51 (Version: 1.51)
Realtek High Definition Audio Driver (Version: 6.0.1.5384)
Roxio Easy Media Creator Home (Version: 9.0.178)
Setting Utility Series (Version: 2.1.00.14150)
SigmaTel Audio (Version: 5.10.5102.0)
Skype 3.0 (Version: 3.0)
Skype Plugin Manager (Version: 1.0.217)
SonicStage 4.3 (Version: 4.3)
SonicStage Mastering Studio (Version: 2.3.01)
SonicStage Mastering Studio Audio Filter (Version: 2.3.01)
SonicStage Mastering Studio Audio Filter Custom Preset (Version: 2.3)
SonicStage Mastering Studio Plugins (Version: 2.3)
Sony Utilities DLL (Version: 7.1.00.15150)
Sony Video Shared Library (Version: 3.1.03)
SopCast 1.1.2 (Version: 1.1.2)
Synaptics Pointing Device Driver (Version: 9.1.13.0)
System Requirements Lab
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Microsoft Office 2007 Help for Common Features (KB963673)
Update for Microsoft Office 2007 suites (KB2596651) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596789) 32-Bit Edition
Update for Microsoft Office 2007 System (KB2539530)
Update for Microsoft Office Excel 2007 (KB2596596) 32-Bit Edition
Update for Microsoft Office Excel 2007 Help (KB963678)
Update for Microsoft Office OneNote 2007 (KB980729)
Update for Microsoft Office OneNote 2007 Help (KB963670)
Update for Microsoft Office Powerpoint 2007 Help (KB963669)
Update for Microsoft Office Script Editor Help (KB963671)
Update for Microsoft Office Word 2007 Help (KB963665)
VAIO Aqua Breeze Wallpaper (Version: 1.0.11.13240)
VAIO AV Mode Launcher (Version: 1.0.00.03210)
VAIO Camera Capture Utility (Version: 2.2.00.14140)
VAIO Camera Utility (Version: 2.0.01.02070)
VAIO Control Center (Version: 2.0.00.11060)
VAIO Cozy Orange Wallpaper (Version: 1.0.11.13240)
VAIO Data Restore Tool (Version: 1.0.01.01250)
VAIO Entertainment Platform (Version: 2.0.02.13290)
VAIO Event Service (Version: 3.1.00.15090)
VAIO Hardware Diagnostics
VAIO Media (Version: 6.0.10)
VAIO Media 6.0 (Version: 6.0.10)
VAIO Media AC3 Decoder 1.0
VAIO Media Content Collection 6.0
VAIO Media Integrated Server 6.0
VAIO Media Redistribution 6.0 (Version: 6.0.10)
VAIO Media Registration Tool (Version: 6.0.10)
VAIO Media Registration Tool 6.0 (Version: 6.0.10)
VAIO Original Screen Saver
VAIO Photo 2007 (Version: 1.0.01.01250)
VAIO Power Management (Version: 2.1.00.14090)
VAIO Tender Green Wallpaper (Version: 1.0.11.10180)
VAIO Update 3 (Version: 3.0.01.02050)
VAIO Video & Photo Suite (Version: 1.1.00.13301)
VC80CRTRedist - 8.0.50727.4053 (Version: 1.1.0)
Windows Live Messenger (Version: 8.1.0178.00)
Windows Live Sign-in Assistant (Version: 4.100.313.1)
WinDVD for VAIO (Version: 8.0-B8.229)
WinRAR archiver
Wireless Switch Setting Utility (Version: 3.6.00.14270)
Yahoo! Toolbar

========================= Devices: ================================


========================= Memory info: ===================================

Percentage of memory in use: 54%
Total physical RAM: 2045.7 MB
Available physical RAM: 937.86 MB
Total Pagefile: 4326.66 MB
Available Pagefile: 2913.66 MB
Total Virtual: 2047.88 MB
Available Virtual: 1946.11 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:139.27 GB) (Free:24.14 GB) NTFS

========================= Users: ========================================

User accounts for \\RPC-TJM25

Administrator Guest tom

========================= Minidump Files ==================================

C:\Windows\Minidump\Mini020312-01.dmp
C:\Windows\Minidump\Mini021610-01.dmp
C:\Windows\Minidump\Mini040510-01.dmp
C:\Windows\Minidump\Mini060408-01.dmp
C:\Windows\Minidump\Mini060610-01.dmp
C:\Windows\Minidump\Mini061508-01.dmp
C:\Windows\Minidump\Mini062908-01.dmp
C:\Windows\Minidump\Mini070909-01.dmp
C:\Windows\Minidump\Mini071011-01.dmp
C:\Windows\Minidump\Mini111010-01.dmp
C:\Windows\Minidump\Mini111510-01.dmp
C:\Windows\Minidump\Mini112010-01.dmp

**** End of log ****

#4 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 05:00 AM

Wasn't sure how to disable current anti-malware softwares, but don't think any are up and running. Is the Rkill log below normal, or was it cut short?

Rkill log;

file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 04/02/2012 at 9:55:45.
Operating System: Windows Vista ™ Home Premium


Processes terminated by Rkill or while it was running:



Rkill completed on 04/02/2012 at 9:55:48.

#5 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 06:26 AM

SuperAntiSpyware log;

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/04/2012 at 11:14 AM

Application Version : 5.0.1144

Core Rules Database Version : 8203
Trace Rules Database Version: 6015

Scan type : Complete Scan
Total Scan Time : 01:06:02

Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 1 (Build 6.00.6001)
UAC Off - Administrator

Memory items scanned : 344
Memory threats detected : 0
Registry items scanned : 36691
Registry threats detected : 21
File items scanned : 76251
File threats detected : 345

Adware.180solutions/Seekmo
HKCR\HostIE.Bho
HKCR\HostIE.Bho\CLSID
HKCR\HostIE.Bho\CurVer
HKCR\HostIE.Bho.1
HKCR\HostIE.Bho.1\CLSID

Adware.Zango Toolbar/Hb
HKCR\HBMain.CommBand
HKCR\HBMain.CommBand\CLSID
HKCR\HBMain.CommBand\CurVer
HKCR\HBMain.CommBand.1
HKCR\HBMain.CommBand.1\CLSID
HKCR\hbr.HbMain
HKCR\hbr.HbMain\CLSID
HKCR\hbr.HbMain\CurVer
HKCR\hbr.HbMain.1
HKCR\hbr.HbMain.1\CLSID

Trojan.DNSChanger-Codec
HKU\S-1-5-21-547026146-78651472-2889874238-1003\Software\fcn

Adware.Zango/ShoppingReport
HKCR\WeatherDPA.WeatherController
HKCR\WeatherDPA.WeatherController\CLSID
HKCR\WeatherDPA.WeatherController\CurVer
HKCR\WeatherDPA.WeatherController.1
HKCR\WeatherDPA.WeatherController.1\CLSID

Adware.Tracking Cookie
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@ads.bleepingcomputer[1].txt [ /ads.bleepingcomputer ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@avgtechnologies.112.2o7[1].txt [ /avgtechnologies.112.2o7 ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@collective-media[2].txt [ /collective-media ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@discounthotels.co[1].txt [ /discounthotels.co ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@doubleclick[1].txt [ /doubleclick ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@invitemedia[2].txt [ /invitemedia ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@kontera[1].txt [ /kontera ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@serving-sys[2].txt [ /serving-sys ]
C:\Users\tom\AppData\Roaming\Microsoft\Windows\Cookies\tom@youporn[1].txt [ /youporn ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@atdmt[1].txt [ Cookie:administrator@atdmt.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@apmebf[2].txt [ Cookie:administrator@apmebf.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@media6degrees[2].txt [ Cookie:administrator@media6degrees.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@adviva[2].txt [ Cookie:administrator@adviva.net/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@adtech[1].txt [ Cookie:administrator@adtech.de/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@tradedoubler[1].txt [ Cookie:administrator@tradedoubler.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@partypoker[1].txt [ Cookie:administrator@partypoker.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@adbrite[2].txt [ Cookie:administrator@adbrite.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@specificclick[2].txt [ Cookie:administrator@specificclick.net/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@statse.webtrendslive[2].txt [ Cookie:administrator@statse.webtrendslive.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@revsci[2].txt [ Cookie:administrator@revsci.net/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@allyours.virginmedia[1].txt [ Cookie:administrator@allyours.virginmedia.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@tribalfusion[1].txt [ Cookie:administrator@tribalfusion.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@track.adform[1].txt [ Cookie:administrator@track.adform.net/adfscript ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@dc.tremormedia[2].txt [ Cookie:administrator@dc.tremormedia.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@clickshift[1].txt [ Cookie:administrator@clickshift.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@adecn[1].txt [ Cookie:administrator@adecn.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@vdwp.solution.weborama[2].txt [ Cookie:administrator@vdwp.solution.weborama.fr/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@weborama[1].txt [ Cookie:administrator@weborama.fr/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@virginmedia[2].txt [ Cookie:administrator@virginmedia.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@doubleclick[1].txt [ Cookie:administrator@doubleclick.net/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@serving-sys[1].txt [ Cookie:administrator@serving-sys.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@mediaplex[2].txt [ Cookie:administrator@mediaplex.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@ad.yieldmanager[1].txt [ Cookie:administrator@ad.yieldmanager.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@247realmedia[2].txt [ Cookie:administrator@247realmedia.com/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@track.adform[3].txt [ Cookie:administrator@track.adform.net/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@ipcmedia.122.2o7[1].txt [ Cookie:administrator@ipcmedia.122.2o7.net/ ]
C:\USERS\ADMINISTRATOR\AppData\Roaming\Microsoft\Windows\Cookies\administrator@rts.pgmediaserve[1].txt [ Cookie:administrator@rts.pgmediaserve.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@atdmt[1].txt [ Cookie:administrator@atdmt.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@apmebf[2].txt [ Cookie:administrator@apmebf.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@media6degrees[2].txt [ Cookie:administrator@media6degrees.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@adviva[2].txt [ Cookie:administrator@adviva.net/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@adtech[1].txt [ Cookie:administrator@adtech.de/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@tradedoubler[1].txt [ Cookie:administrator@tradedoubler.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@partypoker[1].txt [ Cookie:administrator@partypoker.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@adbrite[2].txt [ Cookie:administrator@adbrite.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@specificclick[2].txt [ Cookie:administrator@specificclick.net/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@statse.webtrendslive[2].txt [ Cookie:administrator@statse.webtrendslive.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@revsci[2].txt [ Cookie:administrator@revsci.net/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@allyours.virginmedia[1].txt [ Cookie:administrator@allyours.virginmedia.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@tribalfusion[1].txt [ Cookie:administrator@tribalfusion.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@track.adform[1].txt [ Cookie:administrator@track.adform.net/adfscript ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@dc.tremormedia[2].txt [ Cookie:administrator@dc.tremormedia.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@clickshift[1].txt [ Cookie:administrator@clickshift.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@adecn[1].txt [ Cookie:administrator@adecn.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@vdwp.solution.weborama[2].txt [ Cookie:administrator@vdwp.solution.weborama.fr/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@weborama[1].txt [ Cookie:administrator@weborama.fr/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@virginmedia[2].txt [ Cookie:administrator@virginmedia.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@doubleclick[1].txt [ Cookie:administrator@doubleclick.net/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@serving-sys[1].txt [ Cookie:administrator@serving-sys.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@mediaplex[2].txt [ Cookie:administrator@mediaplex.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@ad.yieldmanager[1].txt [ Cookie:administrator@ad.yieldmanager.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@247realmedia[2].txt [ Cookie:administrator@247realmedia.com/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@track.adform[3].txt [ Cookie:administrator@track.adform.net/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@ipcmedia.122.2o7[1].txt [ Cookie:administrator@ipcmedia.122.2o7.net/ ]
C:\USERS\ADMINISTRATOR\Cookies\administrator@rts.pgmediaserve[1].txt [ Cookie:administrator@rts.pgmediaserve.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@stats.synapa[2].txt [ Cookie:tom@stats.synapa.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@youporn[2].txt [ Cookie:tom@youporn.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tracking.dc-storm[2].txt [ Cookie:tom@tracking.dc-storm.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@d2.advertserve[1].txt [ Cookie:tom@d2.advertserve.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.clickmanage[2].txt [ Cookie:tom@www.clickmanage.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@eyewonder[2].txt [ Cookie:tom@eyewonder.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@rts.pgmediaserve[1].txt [ Cookie:tom@rts.pgmediaserve.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@imrworldwide[3].txt [ Cookie:tom@imrworldwide.com/cgi-bin ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.youporn[3].txt [ Cookie:tom@www.youporn.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@click1.mainadv[1].txt [ Cookie:tom@click1.mainadv.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@free-porn[1].txt [ Cookie:tom@free-porn.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adxpose[1].txt [ Cookie:tom@adxpose.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads.youporn[1].txt [ Cookie:tom@ads.youporn.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adserving.ezanga[2].txt [ Cookie:tom@adserving.ezanga.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@himedia.individuad[1].txt [ Cookie:tom@himedia.individuad.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@interclick[2].txt [ Cookie:tom@interclick.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@clicksor[2].txt [ Cookie:tom@clicksor.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@girlsteachsex[1].txt [ Cookie:tom@girlsteachsex.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@audience2media[1].txt [ Cookie:tom@audience2media.com/servlet/ajrotator/track/pt1103192 ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@invitemedia[4].txt [ Cookie:tom@invitemedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ero-advertising[1].txt [ Cookie:tom@ero-advertising.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@kantarmedia[2].txt [ Cookie:tom@kantarmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@in.getclicky[1].txt [ Cookie:tom@in.getclicky.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adultfriendfinder[1].txt [ Cookie:tom@adultfriendfinder.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@doubleclick[3].txt [ Cookie:tom@doubleclick.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@clickshift[1].txt [ Cookie:tom@clickshift.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@fastclick[1].txt [ Cookie:tom@fastclick.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@mediabrandsww[2].txt [ Cookie:tom@mediabrandsww.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads.footballmedia[2].txt [ Cookie:tom@ads.footballmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@da-tracking[2].txt [ Cookie:tom@da-tracking.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@revsci[2].txt [ Cookie:tom@revsci.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@collective-media[2].txt [ Cookie:tom@collective-media.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@lucidmedia[1].txt [ Cookie:tom@lucidmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@apmebf[2].txt [ Cookie:tom@apmebf.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@accountancyagejobs[2].txt [ Cookie:tom@accountancyagejobs.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.at.atwola[1].txt [ Cookie:tom@uk.at.atwola.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@activesussex[2].txt [ Cookie:tom@activesussex.org/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tracking.dsmmadvantage[1].txt [ Cookie:tom@tracking.dsmmadvantage.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@atdmt[2].txt [ Cookie:tom@atdmt.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[1].txt [ Cookie:tom@uk.sitestat.com/kmgroup/kentonline/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@advancedsearch.virginmedia[2].txt [ Cookie:tom@advancedsearch.virginmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@virginmedia[1].txt [ Cookie:tom@virginmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tracking.servedbyy[2].txt [ Cookie:tom@tracking.servedbyy.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@aim4media[1].txt [ Cookie:tom@aim4media.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@delivery.ads-littlestarmedia.co[2].txt [ Cookie:tom@delivery.ads-littlestarmedia.co.uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@traffic-update.co[2].txt [ Cookie:tom@traffic-update.co.uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.discounthotels.co[2].txt [ Cookie:tom@www.discounthotels.co.uk/united-kingdom/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ocsmedia[2].txt [ Cookie:tom@ocsmedia.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@skyscanner[2].txt [ Cookie:tom@skyscanner.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ad1.emediate[2].txt [ Cookie:tom@ad1.emediate.dk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads.audience2media[2].txt [ Cookie:tom@ads.audience2media.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@rotator.adjuggler[1].txt [ Cookie:tom@rotator.adjuggler.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adviva[3].txt [ Cookie:tom@adviva.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.xxxtube[2].txt [ Cookie:tom@www.xxxtube.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.porntube[3].txt [ Cookie:tom@www.porntube.com/videos/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@overture[1].txt [ Cookie:tom@overture.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@pointroll[2].txt [ Cookie:tom@pointroll.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.burstnet[2].txt [ Cookie:tom@www.burstnet.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@wmedia.rotator.hadj7.adjuggler[1].txt [ Cookie:tom@wmedia.rotator.hadj7.adjuggler.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@serving-sys[1].txt [ Cookie:tom@serving-sys.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@specificclick[1].txt [ Cookie:tom@specificclick.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.porntube[1].txt [ Cookie:tom@www.porntube.com/xml/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@mediatraffic[2].txt [ Cookie:tom@mediatraffic.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@httptrack[2].txt [ Cookie:tom@httptrack.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.skyscanner[2].txt [ Cookie:tom@www.skyscanner.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@googleads.g.doubleclick[2].txt [ Cookie:tom@googleads.g.doubleclick.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@track.adform[2].txt [ Cookie:tom@track.adform.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@or.videochatsexo[1].txt [ Cookie:tom@or.videochatsexo.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@porntube[2].txt [ Cookie:tom@porntube.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@int.sitestat[1].txt [ Cookie:tom@int.sitestat.com/touchplc/local/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[4].txt [ Cookie:tom@uk.sitestat.com/stv/programmes/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adserver2.pitchero[1].txt [ Cookie:tom@adserver2.pitchero.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ad2.adfarm1.adition[1].txt [ Cookie:tom@ad2.adfarm1.adition.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@mm.chitika[1].txt [ Cookie:tom@mm.chitika.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@dc.tremormedia[2].txt [ Cookie:tom@dc.tremormedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.hxtrack[1].txt [ Cookie:tom@www.hxtrack.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@statcounter[2].txt [ Cookie:tom@statcounter.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@realmedia[2].txt [ Cookie:tom@realmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@stats.goode-connect[1].txt [ Cookie:tom@stats.goode-connect.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@media303[1].txt [ Cookie:tom@media303.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adtech[2].txt [ Cookie:tom@adtech.de/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@liveperson[1].txt [ Cookie:tom@liveperson.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@account.betfair[2].txt [ Cookie:tom@account.betfair.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.team-sport.co[3].txt [ Cookie:tom@www.team-sport.co.uk/kart-champs-2011/kart-champs-adult-finalists/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@247realmedia[1].txt [ Cookie:tom@247realmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@histats[1].txt [ Cookie:tom@histats.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads.pointroll[1].txt [ Cookie:tom@ads.pointroll.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@geobanner.facebookofsex[1].txt [ Cookie:tom@geobanner.facebookofsex.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@xiti[1].txt [ Cookie:tom@xiti.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@zanox[1].txt [ Cookie:tom@zanox.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ieastsussex.co[1].txt [ Cookie:tom@ieastsussex.co.uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@exoclick[2].txt [ Cookie:tom@exoclick.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@scj.xxxtube[2].txt [ Cookie:tom@scj.xxxtube.net/cgi/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@archant.122.2o7[1].txt [ Cookie:tom@archant.122.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@flightstats[2].txt [ Cookie:tom@flightstats.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@us.sitestat[1].txt [ Cookie:tom@us.sitestat.com/future/gamesradar/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@server.iad.liveperson[1].txt [ Cookie:tom@server.iad.liveperson.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@content.yieldmanager[1].txt [ Cookie:tom@content.yieldmanager.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@amazon-adsystem[1].txt [ Cookie:tom@amazon-adsystem.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@trafficmp[2].txt [ Cookie:tom@trafficmp.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@accounts.google[2].txt [ Cookie:tom@accounts.google.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[2].txt [ Cookie:tom@uk.sitestat.com/pwc/uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@movieticketscom.122.2o7[1].txt [ Cookie:tom@movieticketscom.122.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@wysistat[3].txt [ Cookie:tom@wysistat.com/images/adp/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ad.adserve[1].txt [ Cookie:tom@ad.adserve.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@at.atwola[2].txt [ Cookie:tom@at.atwola.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@scrabblefinder[1].txt [ Cookie:tom@scrabblefinder.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.accountancyage[1].txt [ Cookie:tom@www.accountancyage.com/aa/young-gun-blog/2095145/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.clicksafe.lloydstsb[1].txt [ Cookie:tom@www.clicksafe.lloydstsb.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@dmtracker[1].txt [ Cookie:tom@dmtracker.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adserver.adtechus[1].txt [ Cookie:tom@adserver.adtechus.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@cdmedia.rotator.hadj7.adjuggler[1].txt [ Cookie:tom@cdmedia.rotator.hadj7.adjuggler.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@2o7[1].txt [ Cookie:tom@2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@server.adformdsp[1].txt [ Cookie:tom@server.adformdsp.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[5].txt [ Cookie:tom@uk.sitestat.com/stv/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@debtsetracking[2].txt [ Cookie:tom@debtsetracking.info/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adfarm1.adition[2].txt [ Cookie:tom@adfarm1.adition.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@xxxtube[1].txt [ Cookie:tom@xxxtube.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.pornhub[2].txt [ Cookie:tom@www.pornhub.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.inteletrack[2].txt [ Cookie:tom@www.inteletrack.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@mlbam.112.2o7[1].txt [ Cookie:tom@mlbam.112.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads2.zeusclicks[1].txt [ Cookie:tom@ads2.zeusclicks.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.googleadservices[10].txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/1071457385/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@pfa.rotator.hadj7.adjuggler[2].txt [ Cookie:tom@pfa.rotator.hadj7.adjuggler.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@richmedia.yahoo[2].txt [ Cookie:tom@richmedia.yahoo.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@premiumtv.122.2o7[1].txt [ Cookie:tom@premiumtv.122.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@debenhams.122.2o7[1].txt [ Cookie:tom@debenhams.122.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adxpansion[2].txt [ Cookie:tom@adxpansion.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ru4[2].txt [ Cookie:tom@ru4.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@zedo[3].txt [ Cookie:tom@zedo.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@avgtechnologies.112.2o7[1].txt [ Cookie:tom@avgtechnologies.112.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@mediametrics.mpsa[2].txt [ Cookie:tom@mediametrics.mpsa.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@kontera[1].txt [ Cookie:tom@kontera.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@toptable.122.2o7[1].txt [ Cookie:tom@toptable.122.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tracking.hostgator[2].txt [ Cookie:tom@tracking.hostgator.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tracker.roitesting[1].txt [ Cookie:tom@tracker.roitesting.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@viacom.adbureau[2].txt [ Cookie:tom@viacom.adbureau.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.googleadservices[8].txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/975610855/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.partypoker[2].txt [ Cookie:tom@www.partypoker.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@trinitymirror.112.2o7[1].txt [ Cookie:tom@trinitymirror.112.2o7.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adsonar[2].txt [ Cookie:tom@adsonar.com/adserving ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@partypoker[3].txt [ Cookie:tom@partypoker.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@questionmarket[1].txt [ Cookie:tom@questionmarket.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@legolas-media[2].txt [ Cookie:tom@legolas-media.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tacoda.at.atwola[2].txt [ Cookie:tom@tacoda.at.atwola.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads3.vasmg[1].txt [ Cookie:tom@ads3.vasmg.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@burstnet[2].txt [ Cookie:tom@burstnet.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ads.crakmedia[1].txt [ Cookie:tom@ads.crakmedia.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[3].txt [ Cookie:tom@uk.sitestat.com/pwc/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@content.yieldmanager[3].txt [ Cookie:tom@content.yieldmanager.com/ak/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@track.webgains[2].txt [ Cookie:tom@track.webgains.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@discountvouchers.co[2].txt [ Cookie:tom@discountvouchers.co.uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@mediaplex[4].txt [ Cookie:tom@mediaplex.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.googleadservices[9].txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/1071431289/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@h.atdmt[2].txt [ Cookie:tom@h.atdmt.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@airfrance.bannerfactory[1].txt [ Cookie:tom@airfrance.bannerfactory.fr/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@ad.zanox[2].txt [ Cookie:tom@ad.zanox.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@adformdsp[1].txt [ Cookie:tom@adformdsp.net/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[6].txt [ Cookie:tom@uk.sitestat.com/future/pop/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[8].txt [ Cookie:tom@uk.sitestat.com/future/totalfilm/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@CASUIDCO.txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/1028640145/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.googleadservices[4].txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/1070641118/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@stats.renault.co[1].txt [ Cookie:tom@stats.renault.co.uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@uk.sitestat[7].txt [ Cookie:tom@uk.sitestat.com/future/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@liveperson[3].txt [ Cookie:tom@liveperson.net/hc/45687557 ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.googleadservices[2].txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/1058857369/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@stats.endsleigh.co[1].txt [ Cookie:tom@stats.endsleigh.co.uk/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@www.googleadservices[1].txt [ Cookie:tom@www.googleadservices.com/pagead/conversion/1040044681/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@stat.ed.cupidplc[1].txt [ Cookie:tom@stat.ed.cupidplc.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@tradedoubler[3].txt [ Cookie:tom@tradedoubler.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@traveladvertising[2].txt [ Cookie:tom@traveladvertising.com/ ]
C:\USERS\TOM\AppData\Roaming\Microsoft\Windows\Cookies\Low\tom@pornhub[1].txt [ Cookie:tom@pornhub.com/ ]
C:\USERS\TOM\Cookies\tom@youporn[1].txt [ Cookie:tom@youporn.com/ ]
C:\USERS\TOM\Cookies\tom@serving-sys[2].txt [ Cookie:tom@serving-sys.com/ ]
C:\USERS\TOM\Cookies\tom@discounthotels.co[1].txt [ Cookie:tom@discounthotels.co.uk/ ]
C:\USERS\TOM\Cookies\tom@invitemedia[2].txt [ Cookie:tom@invitemedia.com/ ]
C:\USERS\TOM\Cookies\tom@doubleclick[1].txt [ Cookie:tom@doubleclick.net/ ]
C:\USERS\TOM\Cookies\tom@avgtechnologies.112.2o7[1].txt [ Cookie:tom@avgtechnologies.112.2o7.net/ ]
C:\USERS\TOM\Cookies\tom@kontera[1].txt [ Cookie:tom@kontera.com/ ]
C:\USERS\TOM\Cookies\tom@collective-media[2].txt [ Cookie:tom@collective-media.net/ ]
cdn5.specificclick.net [ C:\USERS\ADMINISTRATOR\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
objects.tremormedia.com [ C:\USERS\ADMINISTRATOR\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
.doubleclick.net [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
statse.webtrendslive.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adviva.net [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.247realmedia.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.247realmedia.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.specificclick.net [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@ADVERTISING[1].TXT [ /ADVERTISING ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@BS.SERVING-SYS[1].TXT [ /BS.SERVING-SYS ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@AMAZON-ADSYSTEM[1].TXT [ /AMAZON-ADSYSTEM ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@ATDMT[2].TXT [ /ATDMT ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@INVITEMEDIA[1].TXT [ /INVITEMEDIA ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@CASALEMEDIA[2].TXT [ /CASALEMEDIA ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@DOUBLECLICK[1].TXT [ /DOUBLECLICK ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@MEDIA6DEGREES[1].TXT [ /MEDIA6DEGREES ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@RU4[2].TXT [ /RU4 ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@SERVING-SYS[1].TXT [ /SERVING-SYS ]
C:\USERS\TOM\APPDATA\LOCAL\TEMP\LOW\COOKIES\TOM@SPECIFICCLICK[1].TXT [ /SPECIFICCLICK ]
2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
atdmt.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
bc.youporn.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
broadcast.piximedia.fr [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
cdn4.specificclick.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
cdn5.specificclick.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
content.oddcast.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
core.insightexpressai.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
ds.serving-sys.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
ec.atdmt.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
files.youporn.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
gw.callingbanners.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
hs.interpolls.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
hstgb.tradedoubler.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
ia.media-imdb.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
img-cdn.mediaplex.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
interclick.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
m.uk.2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
m1.2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
m1.emea.2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
macromedia.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media.entertonement.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media.foxsports.com.au [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media.resulthost.org [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media.scanscout.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media.tattomedia.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media.thewb.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
media5.wgt.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
mediaplex.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
msntest.serving-sys.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
objects.tremormedia.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
s0.2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
secure-uk.imrworldwide.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
service.twistage.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
serving-sys.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
spe.atdmt.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
stat.easydate.biz [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
static.2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
static.youporn.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
udn.specificclick.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
uk.2mdn.net [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
www.naiadsystems.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
www.pornhub.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
www.porntube.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
zedo.com [ C:\USERS\TOM\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\GVP00001 ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@77TRACKING[2].TXT [ /77TRACKING ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@ADS.AD4GAME[1].TXT [ /ADS.AD4GAME ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@ADS.TRAFFIKINGS[1].TXT [ /ADS.TRAFFIKINGS ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@AZJMP[1].TXT [ /AZJMP ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@BEACHSTREETMEDIA[2].TXT [ /BEACHSTREETMEDIA ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@BS.SERVING-SYS[1].TXT [ /BS.SERVING-SYS ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@BS.SERVING-SYS[2].TXT [ /BS.SERVING-SYS ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@CLICKFUSE[1].TXT [ /CLICKFUSE ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@DOUBLECLICK[1].TXT [ /DOUBLECLICK ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@ESET.122.2O7[1].TXT [ /ESET.122.2O7 ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@GMEUROPE.112.2O7[1].TXT [ /GMEUROPE.112.2O7 ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@GUJ.122.2O7[1].TXT [ /GUJ.122.2O7 ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@INDOORMEDIA.CO[1].TXT [ /INDOORMEDIA.CO ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@KOMEDIA.CO[2].TXT [ /KOMEDIA.CO ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@ONLINEADTRACKER.CO[2].TXT [ /ONLINEADTRACKER.CO ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@PORNOGRAFISH[1].TXT [ /PORNOGRAFISH ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@PORNTUBEMATE[1].TXT [ /PORNTUBEMATE ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@R1-ADS.ACE.ADVERTISING[2].TXT [ /R1-ADS.ACE.ADVERTISING ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@RTS.PGMEDIASERVE[2].TXT [ /RTS.PGMEDIASERVE ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@RTS.PGMEDIASERVE[3].TXT [ /RTS.PGMEDIASERVE ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@SMARTADSERVER[1].TXT [ /SMARTADSERVER ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@SMARTADSERVER[2].TXT [ /SMARTADSERVER ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@SUPREMEADSERVER[1].TXT [ /SUPREMEADSERVER ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@TRIBALFUSION[2].TXT [ /TRIBALFUSION ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@TRIBALFUSION[3].TXT [ /TRIBALFUSION ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@WEBORAMA[1].TXT [ /WEBORAMA ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@XM.XTENDMEDIA[2].TXT [ /XM.XTENDMEDIA ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@YIELDMANAGER[1].TXT [ /YIELDMANAGER ]
C:\USERS\TOM\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOM@ZEDO[1].TXT [ /ZEDO ]

#6 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 06:54 AM

Final log;

Malwarebytes Anti-Malware (Trial) 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.04.01

Windows Vista Service Pack 1 x86 NTFS
Internet Explorer 8.0.6001.19088
tom :: RPC-TJM25 [administrator]

Protection: Enabled

04/02/2012 11:34:11
mbam-log-2012-02-04 (11-34-11).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra |

Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 216136
Time elapsed: 14 minute(s), 23 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6FD31ED6-7C94-4BBC-8E95-F927F4D3A949}

(Adware.180Solutions) -> Quarantined and deleted successfully.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Windows\f49f4daa.dat (Worm.Koobface) -> Quarantined and deleted successfully.

(end)




Could you please let me know what you advise next, and whether I am likely to still be infected?

I really appreciate the help

Mill1234

#7 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 07:55 AM

Also, incase this is worth mentioning, I struggled to get onto Safe mode during all of this, and am unable to get on it now. I kept on restarting the computer and tapping f8, but nothing happended. I was only able to access it when I held down the power button for an emergency shutdown, and then turned the computer back on. The red and green lines came up again, but it let me onto safemode.

Thought it was a bit odd!

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 AM

Posted 04 February 2012 - 12:40 PM

OK,we still have a bit to do. I'll try to be a s plain as possible.

SUPERAntiSypware has a built in "Repairs" feature to fix policy restrictions and certain Windows settings which are sometimes targeted by malware infection. To use this feature, launch SUPERAntiSypware.
  • Click the Preferences button.
  • Click the Repairs tab.
  • Click on (highlight) "Repair broken SafeBoot key" and then click the Repair button.
  • You may be asked to reboot your computer for the changes to take effect.

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.


These need to be updated and these old versions removed. Reboot after removal. If you need help with any let me know.
Adobe Reader 8.1.2 (Version: 8.1.2)
Adobe Shockwave Player 11.5 (Version: 11.5.9.620)
BitComet 1.03 (Version: 1.03)
Google Toolbar for Internet Explorer (Version: 1.0.0)
Java™ SE Runtime Environment 6 (Version: 1.6.0.0)
Yahoo! Toolbar
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 01:38 PM

Sorry, but I'm having problems repairing SafeBoot key with SuperAntispyware.

I don't have a repairs tab within preferences. I have a repairs button on the home page, which after clicking gives a list of repairs options, but doesn't have "Repair broken SafeBoot key".

Is there anywhere else this could be?

Thanks
mill1234

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 AM

Posted 04 February 2012 - 01:48 PM

Lets use
SafeBootKeyRepair.exe
Let us see if we can get Safe mode to run.
Vista users my need to save it to the desktop first then right-click the icon and choose "Run as Administrator".

Please download and run SafeBootKeyRepair.exe.

Once it has completed, please try booting into Safe Mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 01:54 PM

Can't get this to work either i'm afraid.

I tried running as administrator as well, but got the following message;

''Unsupported Version
Error! Unsupported OS or version mismatch.

This batch will only run on Windows 2000 or XP. Please press any key to exit.

Press any key to continue . . ...

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 AM

Posted 04 February 2012 - 02:10 PM

Appears we need a deeper look. Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run skip it and move on.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 mill1234

mill1234
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:54 AM

Posted 04 February 2012 - 02:28 PM

Thanks very much for the help, will let you know how it goes!

#14 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,993 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:04:54 AM

Posted 06 February 2012 - 12:26 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/topic441405.html you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users