Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

My computer is definitly infected!


  • This topic is locked This topic is locked
12 replies to this topic

#1 Casie89

Casie89

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 29 May 2012 - 06:47 PM

A virus has gripped my computer with hooked talons and is unwilling to let go. It causes my computer to run REEEEAALLY SLOOOWLY, Internet Explorer (which I have recently stopped using) is refusing to erase history that never even happened (i.e. porn sites), programs to suddenly stop responding, the cursor to move to a new place in whatever I am typing, the whole machine to freeze up, antivirus programs (AVG, Spybot, and Avast!) cannot scan, all folders seem to be locked (without my permission), and upon trying to run Rkill, I got the Blue Screen of Death with an error message of some sort about restarting the computer. I did not get to read the entire thing, because my computer restarted itself. When it asked me, I chose to boot up in Safe Mode, unsure if that was actually going to help. Long story short, I have not been able to run any proper scans (Avast! tells me access is denied, while the other two tell me that all files are locked), and am scared of what new horrors will follow. I need my computer for work and school, so any suggestions would be greatly appreciated. In other words, PLEASE HELP ME!!

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:20 AM

Posted 29 May 2012 - 07:55 PM

Hello, I moved you from Vista to the Am I Infected forum. I am investigating a solution.


Let's do this....

Please click Start > Run, type inetcpl.cpl in the runbox and press enter.
Click the Connections tab and click the LAN settings option.
Verify if "Use a proxy..." is checked, if so, UNcheck it and click OK/OK to exit.




Reboot into Safe Mode with Networking
How to enter safe mode(XP/Vista)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode with Networking using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.


>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.


Run RKill....


Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.

>>>>>
Please download TDSSKiller.zip and and extract it.
  • Run TDSSKiller.exe.
  • Click on Change Parameters
  • Put a check in the box of Detect TDLFS file system
  • Click Start scan.
  • When it is finished the utility outputs a list of detected objects with description.
    The utility automatically selects an action (Cure or Delete) for malicious objects.
    The utility prompts the user to select an action to apply to suspicious objects (Skip, by default). Let the options as it is and click Continue
  • Let reboot if needed and tell me if the tool needed a reboot.
  • Click on Report and post the contents of the text file that will open.

    Note: By default, the utility outputs the log into system disk (it is usually the disk with installed operating system, C:\) root folder. The Log have a name like: TDSSKiller.Version_Date_Time_log.txt.




Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now reboot to Normal and run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware Posted Image and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you cannot update Malwarebytes or use the Internet to download any files to the infected computer, manually update the database by following the instructions in FAQ Section A: 4. Issues.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

-- Some types of malware will target Malwarebytes and other security tools to keep them from running properly. If that's the case, go to Start > All Programs > Malwarebytes Anti-Malware folder > Tools > click on Malwarebytes Chameleon and follow the onscreen instructions. The Chameleon folder can be accessed by opening the program folder for Malwarebytes Anti-Malware (normally C:\Program Files\Malwarebytes' Anti-Malware or C:\Program Files (x86)\Malwarebytes' Anti-Malware).

Please ask any needed questions,post logs and Let us know how the PC is running now.

Edited by boopme, 29 May 2012 - 08:11 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Casie89

Casie89
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 02 June 2012 - 02:07 AM

I had my whole reply typed out, but when I had to reboot after running SAS, the whole thing was left behind, even though I bookmarked it. If you need any of the resulting scan logs, let me know and I will redo the scans. None of them found anything except for the last one (SAS), which found 290 tracking cookies and one Couponbar adware. I didn't recognize the Couponbar one. JUST NOW, when I clicked on the start icon to access my SAS scan log, it "stopped responding" and "ended the task," efficiently eliminating my start icon and everything else in that lower-screen toolbar... now it's back. Here's a copy of the SAS scan log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/01/2012 at 04:59 PM

Application Version : 5.0.1150

Core Rules Database Version : 8674
Trace Rules Database Version: 6486

Scan type : Complete Scan
Total Scan Time : 01:37:10

Operating System Information
Windows Vista Home Premium 64-bit, Service Pack 2 (Build 6.00.6002)
UAC Off - Administrator

Memory items scanned : 331
Memory threats detected : 0
Registry items scanned : 65170
Registry threats detected : 0
File items scanned : 221792
File threats detected : 291

Adware.Tracking Cookie
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@ad.yieldmanager[3].txt [ Cookie:shyla@ad.yieldmanager.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\EQ66LL4Y.txt [ Cookie:shyla@insightexpressai.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@trafficmp[3].txt [ Cookie:shyla@trafficmp.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@lucidmedia[3].txt [ Cookie:shyla@lucidmedia.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@petfinder[3].txt [ Cookie:shyla@petfinder.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\1OE2X5S3.txt [ Cookie:shyla@doubleclick.net/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@content.yieldmanager[6].txt [ Cookie:shyla@content.yieldmanager.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@atdmt[1].txt [ Cookie:shyla@atdmt.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\3V5IB3K9.txt [ Cookie:shyla@accounts.google.com/ ]
C:\USERS\SHYLA\AppData\Roaming\Microsoft\Windows\Cookies\Low\shyla@richmedia.yahoo[2].txt [ Cookie:shyla@richmedia.yahoo.com/ ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
accounts.google.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.trafficmp.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.trafficmp.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.trafficmp.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\GUEST\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.fastclick.net [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.fastclick.net [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.fastclick.net [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.fastclick.net [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tribalfusion.com [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ C:\USERS\SHYLA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@A1.INTERCLICK[1].TXT [ /A1.INTERCLICK ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@AD.WSOD[2].TXT [ /AD.WSOD ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@AD.YIELDMANAGER[2].TXT [ /AD.YIELDMANAGER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADBRITE[1].TXT [ /ADBRITE ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADINTERAX[1].TXT [ /ADINTERAX ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADS.POINTROLL[2].TXT [ /ADS.POINTROLL ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADS.POINTROLL[3].TXT [ /ADS.POINTROLL ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADS.POINTROLL[4].TXT [ /ADS.POINTROLL ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADVERTISING[1].TXT [ /ADVERTISING ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADVERTISING[2].TXT [ /ADVERTISING ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@ADVERTISING[4].TXT [ /ADVERTISING ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@CASALEMEDIA[2].TXT [ /CASALEMEDIA ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@CONTENT.YIELDMANAGER[1].TXT [ /CONTENT.YIELDMANAGER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@CONTENT.YIELDMANAGER[2].TXT [ /CONTENT.YIELDMANAGER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@CONTENT.YIELDMANAGER[3].TXT [ /CONTENT.YIELDMANAGER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@CONTENT.YIELDMANAGER[4].TXT [ /CONTENT.YIELDMANAGER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@CONTENT.YIELDMANAGER[5].TXT [ /CONTENT.YIELDMANAGER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@GOOGLEADS.G.DOUBLECLICK[1].TXT [ /GOOGLEADS.G.DOUBLECLICK ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@IMRWORLDWIDE[2].TXT [ /IMRWORLDWIDE ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@INTERCLICK[2].TXT [ /INTERCLICK ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@INVITEMEDIA[1].TXT [ /INVITEMEDIA ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@INVITEMEDIA[2].TXT [ /INVITEMEDIA ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@INVITEMEDIA[3].TXT [ /INVITEMEDIA ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@LEGOLAS-MEDIA[1].TXT [ /LEGOLAS-MEDIA ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@LUCIDMEDIA[2].TXT [ /LUCIDMEDIA ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@MEDIA6DEGREES[2].TXT [ /MEDIA6DEGREES ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@MEDIAPLEX[1].TXT [ /MEDIAPLEX ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@MEDIAPLEX[2].TXT [ /MEDIAPLEX ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@PETFINDER[1].TXT [ /PETFINDER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@POINTROLL[2].TXT [ /POINTROLL ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@QUESTIONMARKET[1].TXT [ /QUESTIONMARKET ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@QUESTIONMARKET[2].TXT [ /QUESTIONMARKET ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@REVSCI[1].TXT [ /REVSCI ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@REVSCI[3].TXT [ /REVSCI ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@SPECIFICCLICK[1].TXT [ /SPECIFICCLICK ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@TRADEDOUBLER[1].TXT [ /TRADEDOUBLER ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@TRAFFICMP[2].TXT [ /TRAFFICMP ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@TRIBALFUSION[1].TXT [ /TRIBALFUSION ]
C:\USERS\SHYLA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\SHYLA@WWW.GOOGLEADSERVICES[3].TXT [ /WWW.GOOGLEADSERVICES ]
.doubleclick.net [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.apmebf.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.trafficmp.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.trafficmp.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.yieldmanager.net [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.trafficmp.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.amazon-adsystem.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.amazon-adsystem.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.at.atwola.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.mediaplex.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.mediaplex.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ C:\USERS\SHYLA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\U9PEOCT6.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adbrite.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.yieldmanager.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.specificmedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adbrite.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adecn.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.dmtracker.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.questionmarket.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.questionmarket.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.questionmarket.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.imrworldwide.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.imrworldwide.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tacoda.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.at.atwola.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.at.atwola.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.specificclick.net [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.realmedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.realmedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.realmedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
network.realmedia.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.media6degrees.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.media6degrees.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.media6degrees.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.media6degrees.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.media6degrees.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tribalfusion.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adbrite.com [ C:\USERS\THERESA\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.yieldmanager.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.adinterax.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.amazon-adsystem.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.amazon-adsystem.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.ads.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.t.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.collective-media.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.t.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.questionmarket.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.t.pointroll.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.serving-sys.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.bs.serving-sys.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.a1.interclick.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
dc.tremormedia.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.legolas-media.com [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]
.revsci.net [ C:\USERS\THERESA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\B1GU7R97.DEFAULT\COOKIES.SQLITE ]

Adware.CouponBar
C:\USERS\THERESA\APPDATA\LOCAL\TEMP\LOW\CPNPRT2.CID

Just began the MBAM setup process. When I tried to rename the file 321cba.exe, I recieved a message that read "You must enter a full path with drive letter," so I used the name C:/ APP, which was one of the examples it gave. I then updated and scanned. Here is a copy of the resulting log:

Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Database version: v2012.06.02.02

Windows Vista Service Pack 2 x64 NTFS
Internet Explorer 9.0.8112.16421
Guest :: LIFE-ON-THE [administrator]

6/2/2012 12:04:12 AM
mbam-log-2012-06-02 (00-04-12).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: File System | P2P
Objects scanned: 234636
Time elapsed: 42 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Users\Guest\Downloads\eXplorer.exe (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.

(end)

I'll go ahead and post another reply later on to tell how my computer is running.

#4 Casie89

Casie89
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 02 June 2012 - 02:22 AM

I almost forgot- during this whole process, I have updated my version of Firefox the newest. Wasn't sure if that mattered at all...

Upon restarting my computer from my previous post, it booted up very quickly, far faster than usual (YES!!!), but Firefox still loaded up kind of slowly. Perhaps this was because it had to load up two tabs instead of one. Otherwise, my computer seems to be running fine again. Is there any surefire way to make sure it's "squeaky clean"- no viruses or anything?

Thank you! :thumbsup:

.........................................................................................................................................................................................................................................................................................................
Just decided to edit this post instead of posting another one. I am running another scan using Spybot- Search and Destroy, and am unsure whether the words along the bottom of the widow are what it is checking for, or what it is finding. I am googling some of the things it says, and most of them are malicious cookies and tracking cookies... but the program isn't telling me it's finding anything. Also, Firefox just closed itself, and I am noticing some other small problems. Can't wait to rid my computer of this stuff!

Edited by Casie89, 02 June 2012 - 03:22 PM.


#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:20 AM

Posted 02 June 2012 - 08:13 PM

Hello,it may be showing the virus signayures in the database.

Lets do these to be sure it all good.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



Please download TDSSKiller.zip and and extract it.
  • Run TDSSKiller.exe.
  • Click Start scan.
  • When it is finished the utility outputs a list of detected objects with description.
    The utility automatically selects an action (Cure or Delete) for malicious objects.
    The utility prompts the user to select an action to apply to suspicious objects (Skip, by default). Let the options as it is and click Continue
  • Let reboot if needed and tell me if the tool needed a reboot.
  • Click on Report and post the contents of the text file that will open.

    Note: By default, the utility outputs the log into system disk (it is usually the disk with installed operating system, C:\) root folder. The Log has a name like: TDSSKiller.Version_Date_Time_log.txt.



Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 Casie89

Casie89
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 03 June 2012 - 01:17 PM

Well... here is a copy of the MiniToolBox log the FIRST time I ran it...







And the SECOND time, I found the tool, tried to rename it (trick the virus?), the "Properties" window froze and got that white fog, then I finally got it to close and went to find it again under the name I had tried to call it and the original name and it seems to have disappeared completely- not to mention that "Windows Explorer has stopped working." I'll download and run it one more time... found the original and renamed file in the “Downloads” file… here’s the resulting log (I placed an emoticon by wheat worries me most):

MiniToolBox by Farbar Version: 14-01-2012
Ran by Theresa on 03-06-2012 at 10:55:31
Windows ™ Vista Home Premium Service Pack 2 (X64)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================
The requested operation requires elevation.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================

"network.proxy.type", 4

"Reset FF Proxy Settings": Firefox Proxy settings were reset.

========================= Hosts content: =================================

::1 localhost

127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1001namen.com
127.0.0.1 www.1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com

There are 15220 more lines starting with "127.0.0.1"

========================= IP Configuration: ================================

Intel® WiFi Link 5100 AGN = Wireless Network Connection (Connected)
Realtek RTL8102/8103 Family PCI-E FE NIC = Local Area Connection (Media disconnected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : Life-on-the
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Mixed
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : ph.cox.net

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . : ph.cox.net
Description . . . . . . . . . . . : Intel® WiFi Link 5100 AGN
Physical Address. . . . . . . . . : 00-22-FB-9B-19-B0
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::e88c:3ef9:6936:33d7%12(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.0.193(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Saturday, June 02, 2012 12:09:05 AM
Lease Expires . . . . . . . . . . : Sunday, June 03, 2012 11:25:00 PM
Default Gateway . . . . . . . . . : 192.168.0.1
DHCP Server . . . . . . . . . . . : 192.168.0.1
DHCPv6 IAID . . . . . . . . . . . : 201335547
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-13-90-4E-92-00-25-64-4A-AC-AF
DNS Servers . . . . . . . . . . . : 192.168.0.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek RTL8102/8103 Family PCI-E FE NIC
Physical Address. . . . . . . . . : 00-25-64-4A-AC-AF
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{A21E16DF-49CB-46FE-B070-6FE3B2021E2B}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fd:877:3a90:3f57:ff3e(Preferred)
Link-local IPv6 Address . . . . . : fe80::877:3a90:3f57:ff3e%10(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.ph.cox.net
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: UnKnown
Address: 192.168.0.1

Name: google.com
Addresses: 74.125.224.201
74.125.224.206
74.125.224.192
74.125.224.193
74.125.224.194
74.125.224.195
74.125.224.196
74.125.224.197
74.125.224.198
74.125.224.199
74.125.224.200


Pinging google.com [74.125.224.228] with 32 bytes of data:
Reply from 74.125.224.228: bytes=32 time=21ms TTL=58
Reply from 74.125.224.228: bytes=32 time=22ms TTL=58

Ping statistics for 74.125.224.228:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 21ms, Maximum = 22ms, Average = 21ms
Server: UnKnown
Address: 192.168.0.1

Name: yahoo.com
Addresses: 209.191.122.70
72.30.38.140
98.139.183.24


Pinging yahoo.com [209.191.122.70] with 32 bytes of data:
Reply from 209.191.122.70: bytes=32 time=45ms TTL=57
Reply from 209.191.122.70: bytes=32 time=43ms TTL=57

Ping statistics for 209.191.122.70:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 43ms, Maximum = 45ms, Average = 44ms
Server: UnKnown
Address: 192.168.0.1

Name: bleepingcomputer.com
Address: 208.43.87.2


Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:
Request timed out.
Request timed out.

Ping statistics for 208.43.87.2:
Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
12 ...00 22 fb 9b 19 b0 ...... Intel® WiFi Link 5100 AGN
11 ...00 25 64 4a ac af ...... Realtek RTL8102/8103 Family PCI-E FE NIC
1 ........................... Software Loopback Interface 1
13 ...00 00 00 00 00 00 00 e0 isatap.{A21E16DF-49CB-46FE-B070-6FE3B2021E2B}
10 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
14 ...00 00 00 00 00 00 00 e0 isatap.ph.cox.net
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.193 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.0.0 255.255.255.0 On-link 192.168.0.193 281
192.168.0.193 255.255.255.255 On-link 192.168.0.193 281
192.168.0.255 255.255.255.255 On-link 192.168.0.193 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.0.193 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.0.193 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
10 18 ::/0 On-link
1 306 ::1/128 On-link
10 18 2001::/32 On-link
10 266 2001:0:5ef5:79fd:877:3a90:3f57:ff3e/128
On-link
12 281 fe80::/64 On-link
10 266 fe80::/64 On-link
10 266 fe80::877:3a90:3f57:ff3e/128
On-link
12 281 fe80::e88c:3ef9:6936:33d7/128
On-link
1 306 ff00::/8 On-link
10 266 ff00::/8 On-link
12 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\SysWOW64\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\SysWOW64\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\SysWOW64\winrnr.dll [19968] (Microsoft Corporation)
Catalog5 07 C:\Program Files (x86)\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 07 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 08 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 09 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 11 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 12 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 13 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 14 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 15 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 16 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 17 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 18 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 19 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
x64-Catalog5 01 C:\Windows\System32\NLAapi.dll [61440] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\napinsp.dll [62976] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\winrnr.dll [27648] (Microsoft Corporation)
x64-Catalog5 07 C:\Program Files\Bonjour\mdnsNSP.dll [132968] (Apple Inc.)
x64-Catalog9 01 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 02 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 03 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 04 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 05 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 11 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 12 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 13 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 14 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 15 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 16 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 17 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 18 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 19 C:\Windows\System32\wpclsp.dll [102912] (Microsoft Corporation)

========================= Event log errors: ================================

Could not start eventlog service, could not read events.

System error 5 has occurred.

Access is denied. :ranting:


=========================== Installed Programs ============================

64 Bit HP CIO Components Installer (Version: 6.2.1)
Apple Mobile Device Support (Version: 5.1.1.4)
Bonjour (Version: 3.0.0.10)
Dell Edoc Viewer (Version: 1.0.0)
Dell Touchpad (Version: 7.104.101.102)
HP Customer Participation Program 13.0 (Version: 13.0)
HP Document Manager 2.0 (Version: 2.0)
HP Imaging Device Functions 13.0 (Version: 13.0)
HP Officejet 4500 G510g-m (Version: 13.0)
HP Smart Web Printing 4.60 (Version: 4.60)
HP Solution Center 13.0 (Version: 13.0)
iCloud (Version: 1.1.0.40)
Integrated Webcam Driver (1.00.04.0310) (Version: 1.00.04.0310)
Intel® Graphics Media Accelerator Driver
iTunes (Version: 10.6.1.7)
Java™ 6 Update 13 (64-bit) (Version: 6.0.130)
KONICA MINOLTA magicolor 5440DL
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6015.5000)
Microsoft Office Office 64-bit Components 2007 (Version: 12.0.6612.1000)
Microsoft Office Shared 64-bit MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Shared 64-bit Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Security Client (Version: 4.0.1526.0)
Microsoft Security Essentials (Version: 4.0.1526.0)
Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (x64) - KB2467175 (Version: 8.0.51011)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.56336)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.61000)
Microsoft_VC90_ATL_x86_x64 (Version: 1.00.0000)
Microsoft_VC90_CRT_x86_x64 (Version: 1.00.0000)
Microsoft_VC90_MFC_x86_x64 (Version: 1.00.0000)
MobileMe Control Panel (Version: 3.1.8.0)
Network64 (Version: 130.0.374.000)
OCR Software by I.R.I.S. 13.0 (Version: 13.0)
PaperPort Image Printer 64-bit (Version: 1.00.0000)
Quickset (Version: 9.4.6)
Shop for HP Supplies (Version: 13.0)
Windows Live Family Safety (Version: 15.4.3502.0922)
Windows Live ID Sign-in Assistant (Version: 7.250.4225.0)
Windows Live Language Selector (Version: 15.4.3502.0922)
Windows Live MIME IFilter (Version: 15.4.3502.0922)
Windows Live Remote Client (Version: 15.4.5722.2)
Windows Live Remote Client Resources (Version: 15.4.5722.2)
Windows Live Remote Service (Version: 15.4.5722.2)
Windows Live Remote Service Resources (Version: 15.4.5722.2)
Yahoo! BrowserPlus 2.9.8

========================= Memory info: ===================================

Percentage of memory in use: 55%
Total physical RAM: 4059.45 MB
Available physical RAM: 1810.27 MB
Total Pagefile: 8312.16 MB
Available Pagefile: 6147.07 MB
Total Virtual: 4095.88 MB
Available Virtual: 3996.25 MB

========================= Partitions: =====================================

1 Drive c: (OS) (Fixed) (Total:450.71 GB) (Free:379.12 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:15 GB) (Free:7.63 GB) NTFS

========================= Users: ========================================

User accounts for \\LIFE-ON-THE

Administrator Guest Shyla
Theresa


**** End of log ****



I had all of this typed up on word, and before I tried any of the tools you have suggested, I could not save anything to word- now I can! YES!! Anyways, upon running TDSSKiller, it found nothing, but I couldn't find the report on my computer...

Edited by Casie89, 03 June 2012 - 01:28 PM.


#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:20 AM

Posted 03 June 2012 - 01:49 PM

Hello again. A couplr more things to so and let me know how it is.

Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
    64-bit OS users, should read: Which Java download should I choose for my 64-bit Windows operating system?
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7u4-windows-i586.exe (or jre-7u4-windows-x64.exe for 64-bit) to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered any unwanted software or toolbars during installation, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.




I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 Casie89

Casie89
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 06 June 2012 - 11:47 AM

To update on the current status of my computer, my internet browsers (firefox and IE) have been running slower, the cursor refuses to move at times,and I had a hard time finding and installing the updated Java, but I think I got it. Anyways, the ESET scan was very slow (it was still at 46% after 1 hour and 45 min). Here's the report it produced:

C:\Users\Theresa\Downloads\RegistryEasy_Lite.exe a variant of Win32/Adware.RegistryEasy application deleted - quarantined

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:20 AM

Posted 06 June 2012 - 02:03 PM

Thanks for your effort. I think we need a deeper look.

Include this link back to here.

http://www.bleepingcomputer.com/forums/topic455260.html/page__pid__2722251#top

Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run (it may not on a 64 bit system) skip it and move on.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 Casie89

Casie89
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 08 June 2012 - 08:55 PM

My computer is steadily getting worse. Firefox crashes suddenly, turning black, my computer screen refuses to turn on after being asleep, everything "stops responding," and my task manager window has no red "x" (exit), minus sign (minimize), or restore button at the top.

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:20 AM

Posted 08 June 2012 - 09:30 PM

I take it you cannot run DDS??

Are you able to start a new topic in Virus, Trojan, Spyware, and Malware Removal Logs
Title.."evertyhing stops responding,"

In the body copy and paste this

Windows ™ Vista Home Premium Service Pack 2 (X64)

http://www.bleepingcomputer.com/forums/topic455260.html/page__pid__2724890#entry2724890
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 Casie89

Casie89
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Here, There
  • Local time:01:20 AM

Posted 08 June 2012 - 10:38 PM

I did begin a new topic in "Virus, Trojan, Spyware, and Malware Removal Logs," titled "DDS and GMER Log." I ran DDS, but GMER did not run, which was to be expected. Should I begin another new topic, or add a reply to "DDS and GMER Log" with the information you indicated in your last reply?

Edited by Casie89, 08 June 2012 - 10:43 PM.


#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:20 AM

Posted 09 June 2012 - 07:48 PM

Hello, that looks good now.

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

The current wait time is 1 - 3 days and ALL logs are answered.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users