Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Vundo Trojan Removal Help...please? [RESOLVED]


  • This topic is locked This topic is locked

#1
Truptisaurusrex

Truptisaurusrex

    Member

  • Member
  • PipPip
  • 14 posts
Hi,

Tried to remove this trojan with VirtumundoBeGone and VundoFix. I've attached both of those files for review. VBG said something along the lines of "Nothing detected! Exiting..." but BitDefender still detected the virus.

Here is the Hijack This log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:48:53 AM, on 28/06/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16681)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\hp\support\hpsysdrv.exe
C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe
C:\Windows\System32\rundll32.exe
C:\Windows\RtHDVCpl.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Windows\System32\rundll32.exe
c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\system32\schtasks.exe
C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe
C:\Program Files\Siber Systems\AI RoboForm\robotaskbaricon.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\hp\kbd\kbd.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\Windows\explorer.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.h...a...&pf=desktop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.h...a...&pf=desktop
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: {efcf64e1-a469-956a-d874-053e81348cf0} - {0fc84318-e350-478d-a659-964a1e46fcfe} - C:\Windows\system32\yqniah.dll
O2 - BHO: (no name) - {494669F0-6F5C-48AB-9632-34C8AF1ADC20} - C:\Windows\system32\khfETnmj.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - c:\Program Files\Common Files\Symantec Shared\coShared\Browser\2.0\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: Show Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - c:\Program Files\Common Files\Symantec Shared\coShared\Browser\2.0\CoIEPlg.dll
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [hpsysdrv] c:\hp\support\hpsysdrv.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KbdStub.EXE
O4 - HKLM\..\Run: [OsdMaestro] "C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe"
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [HP Health Check Scheduler] [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateReg] "C:\Windows\system32\jureg.exe"
O4 - HKLM\..\Run: [ccApp] "c:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [MSServer] rundll32.exe C:\Windows\system32\fcCTlmkl.dll,#1
O4 - HKLM\..\Run: [BM1721e9d6] Rundll32.exe "C:\Windows\system32\ofcbjsle.dll",s
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [HPADVISOR] C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe autoRun
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [RoboForm] "C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe"
O4 - HKCU\..\Run: [AdobeUpdater] C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
O4 - HKCU\..\Run: [AdwareAlert] C:\Program Files\AdwareAlert\AdwareAlert.exe -boot
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - Global Startup: Snapfish Media Detector.lnk = C:\Program Files\Snapfish Picture Mover\SnapfishMediaDetector.exe
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O13 - Gopher Prefix:
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - c:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: COM Host (comHost) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - c:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate - Symantec Corporation - c:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE
O23 - Service: LiveUpdate Notice - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe
O23 - Service: VundoFix Service (VundoFixSvc) - Atribune.org - C:\Windows\SYSTEM32\VundoFixSVC.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 9258 bytes


Thanks in advance for the help :)

Attached Files


  • 0

Advertisements


#2
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
*keeping fingers crossed*
  • 0

#3
andrewuk

andrewuk

    Trusted Helper

  • Malware Removal
  • 5,297 posts
Hi Truptisaurusrex

welcome to geekstogo :)

ok, to everyone else as much as to you....dont answer your own post when you start a thread....the way we pick up on new posts is to look for posts with 0 replies :)

and now to the fix.....

if you have already downloaded combofix then could you delete the current version of combofix you have and then follow these instructions:

Please visit this web page for instructions for downloading and running ComboFix

http://www.bleepingc...to-use-combofix

This includes installing the Windows XP Recovery Console in case you have not installed it yet. (All the instructions for installing the Recovery Console are in the above link, but for more information on the Windows XP Recovery Console read http://support.micro...com/kb/314058.)

Once you install the Recovery Console, when you reboot your computer, you'll see the option for the Recovery Console now as well. Don't select Recovery Console as we don't need it. By default, your main OS is selected there. The screen stays for 2 seconds and then it proceeds to load Windows. That is normal.

Post the log from ComboFix when you've accomplished that, along with a new HijackThis log.

**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

andrewuk
  • 0

#4
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Alright, I think I did this correctly! I've pasted the Hijack This log and the Combofix log.

When combofix was running, it rebooted the PC and when it did so, MSN Messenger started up, as well as a reminder from Adobe to update. I closed both items; hope that does not influence the Combofix readout.

HIJACK THIS

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:24, on 2008-06-30
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16681)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\conime.exe
C:\hp\support\hpsysdrv.exe
C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe
C:\Windows\System32\rundll32.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Windows\System32\rundll32.exe
C:\Windows\system32\schtasks.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Siber Systems\AI RoboForm\robotaskbaricon.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\System32\rundll32.exe
C:\hp\kbd\kbd.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.h...a...&pf=desktop
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: (no name) - {127FCD91-32E0-49BE-BFEF-2F73610CC207} - C:\Windows\system32\khfETnmj.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: (no name) - {83C7CD5A-A5D6-47F8-8BF3-9314FEA875F6} - C:\Windows\system32\hgGwxWpO.dll (file missing)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: {5ccf235b-ff3a-302b-1104-6ad257a717ad} - {da717a75-2da6-4011-b203-a3ffb532fcc5} - C:\Windows\system32\xcdecx.dll
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O4 - HKLM\..\Run: [hpsysdrv] c:\hp\support\hpsysdrv.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KbdStub.EXE
O4 - HKLM\..\Run: [OsdMaestro] "C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe"
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [HP Health Check Scheduler] [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [SunJavaUpdateReg] "C:\Windows\system32\jureg.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [1412da4a] rundll32.exe "C:\Windows\system32\kgoipqmg.dll",b
O4 - HKLM\..\Run: [BM1721e9d6] Rundll32.exe "C:\Windows\system32\utfpahue.dll",s
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [RoboForm] "C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe"
O4 - HKCU\..\Run: [AdobeUpdater] C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O13 - Gopher Prefix:
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - c:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: VundoFix Service (VundoFixSvc) - Atribune.org - C:\Windows\SYSTEM32\VundoFixSVC.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 7087 bytes



COMBOFIX - attached

Attached Files


  • 0

#5
andrewuk

andrewuk

    Trusted Helper

  • Malware Removal
  • 5,297 posts
yes, you did it correctly :)

in this post we will clear away the infections i can see in your logs and do an online scan before we go any further.

the scan will likely take 1 hour, quite possibly much longer. so just let them run.

As a Vista user I will require that all the programmes I ask you to run, be run by right clicking the icon and selecting Run as Administrator. Otherwise some programmes may fail to do their job properly

====STEP 1====
1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

File::
C:\Windows\System32\gmqpiogk.ini
C:\Windows\System32\kgoipqmg.dll
C:\Windows\System32\utfpahue.dll
C:\Windows\System32\yxanccrb.dll
C:\Windows\System32\xcdecx.dll
C:\Windows\System32\tqjghgkf.dll
C:\Windows\System32\hxcyldqp.dll
C:\Windows\System32\jbvompqo.dll
C:\Windows\System32\ccfxpumx.dll
C:\Windows\System32\bpxork.dll
C:\Windows\System32\dormwobf.dll
C:\Windows\System32\whjisfgj.dll
C:\Windows\System32\scodcsrq.dll
C:\Windows\System32\kyonaujr.dll
C:\Windows\System32\uqblnksf.dll
C:\Windows\System32\ofcbjsle.dll
C:\Windows\System32\iqluwlhf.dll
C:\Windows\system32\khfETnmj.dll
C:\Windows\system32\hgGwxWpO.dll

Registry::
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{009aa253-414f-11dd-8110-001e8c77262a}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{127FCD91-32E0-49BE-BFEF-2F73610CC207}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{83C7CD5A-A5D6-47F8-8BF3-9314FEA875F6}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{da717a75-2da6-4011-b203-a3ffb532fcc5}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"1412da4a"=-
"BM1721e9d6"=-


3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

Posted Image


5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
  • A new HijackThis log.



====STEP 2====
Please download ATF Cleaner by Atribune.
This program is for XP and Windows 2000 only, and works with VistaDouble-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.



====STEP 3====
Please do an online scan with Kaspersky WebScanner

Click on Accept

You will be promted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

In your next reply could i see:
1. the combofix log (and could you copy and paste it onto the forum, makes it easier for me to read
2. a new hijackthis log
3. the kasperskyscan log

The text from these files may exceed the maximum post length for this forum. Hence, you may need to post the information over 2 or more posts.

andrewuk
  • 0

#6
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Attached the ComboFix and Kaspersky logs, HijackThis log below :)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:29:46 PM, on 01/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16681)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\conime.exe
C:\hp\support\hpsysdrv.exe
C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe
C:\Windows\System32\rundll32.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\system32\schtasks.exe
C:\Program Files\Siber Systems\AI RoboForm\robotaskbaricon.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\hp\kbd\kbd.exe
C:\Windows\Explorer.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.h...a...&pf=desktop
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O4 - HKLM\..\Run: [hpsysdrv] c:\hp\support\hpsysdrv.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KbdStub.EXE
O4 - HKLM\..\Run: [OsdMaestro] "C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe"
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [HP Health Check Scheduler] [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [SunJavaUpdateReg] "C:\Windows\system32\jureg.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [RoboForm] "C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe"
O4 - HKCU\..\Run: [AdobeUpdater] C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O13 - Gopher Prefix:
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - c:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: VundoFix Service (VundoFixSvc) - Atribune.org - C:\Windows\SYSTEM32\VundoFixSVC.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 6441 bytes

Attached Files


  • 0

#7
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
I just noticed the Kaspersky file is saved as HTML. I will run it again and save it to .txt this time. My bad!
  • 0

#8
andrewuk

andrewuk

    Trusted Helper

  • Malware Removal
  • 5,297 posts
no problem.....i can read the html attachment.

your logs are looking better now. the kaspersky scan found several infections, though most were safely quarantined. we will clear away the rest and do a couple more scans before we wrap this up.

the scans will likely take 2 hours, quite possibly much longer. so just let them run.

also, could you copy and paste all the logs onto the post, it is harder to read attachments.

As a Vista user I will require that all the programmes I ask you to run, be run by right clicking the icon and selecting Run as Administrator. Otherwise some programmes may fail to do their job properly

====STEP 1====
Please re-open HiJackThis and scan. Check the boxes next to all the entries listed below.

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.h...a...&pf=desktop


Now close all windows other than HiJackThis, then click Fix Checked. Close HiJackThis.



====STEP 2====
1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

File::
C:\Windows\System32\yqniah.dll

Folder::
C:\Users\Trupti\Documents\Downloads\spydoc6 Folder.rar


3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

Posted Image


5. if it asks to reboot, then reboot.

i dont need to see the combofix report this time.



====STEP 3====
Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.



====STEP 4====
Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.



====STEP 5====
Please download Deckard's System Scanner (DSS) and save it to your Desktop.
  • Close all other windows before proceeding.
  • Double-click on dss.exe and follow the prompts.
  • When it has finished, dss will open two Notepads main.txt and extra.txt -- please copy (CTRL+A and then CTRL+C) and paste (CTRL+V) the contents of main.txt and extra.txt in your next reply.

In your next reply could i see:
1. the malwarebytes log
2. the SUPERantispyware log
3. the 2 DSS logs

The text from these files may exceed the maximum post length for this forum. Hence, you may need to post the information over 2 or more posts.

andrewuk
  • 0

#9
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Kaspersky file attached :)

Attached Files


  • 0

#10
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Sorry, please ignore post #9.
  • 0

Advertisements


#11
andrewuk

andrewuk

    Trusted Helper

  • Malware Removal
  • 5,297 posts
no problem :)
  • 0

#12
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Malwarebytes log

Malwarebytes' Anti-Malware 1.19
Database version: 913
Windows 6.0.6000

9:10:34 PM 01/07/2008
mbam-log-7-1-2008 (21-10-34).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 183584
Time elapsed: 22 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\QooBox\Quarantine\C\Windows\System32\cbXRIcYs.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Windows\System32\jkkJDvTJ.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Windows\System32\uqblnksf.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
  • 0

#13
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
SUPERantispyware log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/02/2008 at 07:04 AM

Application Version : 4.15.1000

Core Rules Database Version : 3495
Trace Rules Database Version: 1486

Scan type : Complete Scan
Total Scan Time : 09:49:44

Memory items scanned : 500
Memory threats detected : 0
Registry items scanned : 6572
Registry threats detected : 0
File items scanned : 1636206
File threats detected : 522

Adware.Tracking Cookie
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@adbrite[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@atdmt[3].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@mediaplex[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tacoda[3].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@apmebf[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@specificclick[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tribalfusion[3].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@advertising[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@casalemedia[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@2o7[3].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@zedo[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@kontera[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@doubleclick[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adcentriconline[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adecn[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adnetserver[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adnetserver[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@advertising[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@atdmt[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@atdmt[3].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@directtrack[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@doubleclick[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@enhance[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@findwhat[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@hitbox[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@hornymatches[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@hypertracker[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@imrworldwide[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@interclick[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@overture[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@pcsecuresystem[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@precisionclick[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@questionmarket[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@specificclick[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@tacoda[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@zedo[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@zedo[3].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@2o7[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@2o7[3].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@adbrite[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@adrevolver[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@advertising[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@apmebf[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@apmebf[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@atdmt[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@atdmt[3].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@casalemedia[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@doubleclick[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@fastclick[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@imrworldwide[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@kontera[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@mediaplex[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@revsci[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@specificclick[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tacoda[2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tacoda[3].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tribalfusion[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tribalfusion[3].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@zedo[1].txt
C:\Documents and Settings\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@zedo[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adcentriconline[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adecn[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adnetserver[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adnetserver[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@advertising[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@atdmt[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@atdmt[3].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@directtrack[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@doubleclick[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@enhance[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@findwhat[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@hitbox[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@hornymatches[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@hypertracker[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@imrworldwide[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@interclick[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@overture[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@pcsecuresystem[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@precisionclick[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@questionmarket[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@specificclick[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@tacoda[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@zedo[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@zedo[3].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@2o7[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@2o7[3].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@adbrite[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@adrevolver[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@advertising[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@apmebf[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@apmebf[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@atdmt[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@atdmt[3].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@casalemedia[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@doubleclick[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@fastclick[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@imrworldwide[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@kontera[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@mediaplex[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@revsci[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@specificclick[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tacoda[2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tacoda[3].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tribalfusion[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tribalfusion[3].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@zedo[1].txt
C:\Documents and Settings\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@zedo[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@adcentriconline[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@adecn[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@adnetserver[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@adnetserver[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@advertising[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@atdmt[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@atdmt[3].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@directtrack[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@doubleclick[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@enhance[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@findwhat[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@hitbox[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@hornymatches[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@hypertracker[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@imrworldwide[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@interclick[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@overture[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@pcsecuresystem[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@precisionclick[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@questionmarket[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@specificclick[2].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@tacoda[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@zedo[1].txt
C:\Documents and Settings\Trupti\Cookies\Low\trupti@zedo[3].txt
C:\Documents and Settings\Trupti\Cookies\trupti@2o7[1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@2o7[3].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@adbrite[1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@adrevolver[2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@advertising[1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@apmebf[1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@apmebf[2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@atdmt[2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@atdmt[3].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@casalemedia[2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@doubleclick[1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@fastclick[2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@imrworldwide[2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@kontera[2].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@mediaplex[1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@revsci[1].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@specificclick[1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@tacoda[2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@tacoda[3].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@tribalfusion[1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@tribalfusion[3].txt
C:\Documents and Settings\Trupti\Cookies\[email protected][2].txt
C:\Documents and Settings\Trupti\Cookies\trupti@zedo[1].txt
C:\Documents and Settings\Trupti\Cookies\trupti@zedo[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adcentriconline[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adecn[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adnetserver[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@adnetserver[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@advertising[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@atdmt[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@atdmt[3].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@directtrack[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@doubleclick[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@enhance[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@findwhat[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@hitbox[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@hornymatches[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@hypertracker[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@imrworldwide[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@interclick[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@overture[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@pcsecuresystem[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@precisionclick[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@questionmarket[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@specificclick[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@tacoda[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@zedo[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\Low\trupti@zedo[3].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@2o7[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@adrevolver[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@apmebf[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@atdmt[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@fastclick[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@imrworldwide[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@revsci[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tacoda[2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@tribalfusion[1].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\AppData\Roaming\Microsoft\Windows\Cookies\trupti@zedo[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adcentriconline[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adecn[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adnetserver[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@adnetserver[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@advertising[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@atdmt[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@atdmt[3].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@directtrack[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@doubleclick[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@enhance[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@findwhat[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@hitbox[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@hornymatches[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@hypertracker[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@imrworldwide[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@interclick[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@overture[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@pcsecuresystem[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@precisionclick[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@questionmarket[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@specificclick[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@tacoda[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@zedo[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\Low\trupti@zedo[3].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@2o7[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@2o7[3].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@adbrite[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@adrevolver[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@advertising[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@apmebf[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@apmebf[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@atdmt[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@atdmt[3].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@casalemedia[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@doubleclick[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@fastclick[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@imrworldwide[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@kontera[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@mediaplex[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@revsci[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@specificclick[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tacoda[2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tacoda[3].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tribalfusion[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@tribalfusion[3].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\[email protected][2].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@zedo[1].txt
C:\Users\Trupti\Application Data\Microsoft\Windows\Cookies\trupti@zedo[2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\trupti@adcentriconline[1].txt
C:\Users\Trupti\Cookies\Low\trupti@adecn[1].txt
C:\Users\Trupti\Cookies\Low\trupti@adnetserver[1].txt
C:\Users\Trupti\Cookies\Low\trupti@adnetserver[2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\trupti@advertising[1].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\trupti@atdmt[1].txt
C:\Users\Trupti\Cookies\Low\trupti@atdmt[3].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\trupti@directtrack[1].txt
C:\Users\Trupti\Cookies\Low\trupti@doubleclick[2].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\trupti@enhance[2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\trupti@findwhat[1].txt
C:\Users\Trupti\Cookies\Low\trupti@hitbox[2].txt
C:\Users\Trupti\Cookies\Low\trupti@hornymatches[1].txt
C:\Users\Trupti\Cookies\Low\trupti@hypertracker[2].txt
C:\Users\Trupti\Cookies\Low\trupti@imrworldwide[1].txt
C:\Users\Trupti\Cookies\Low\trupti@interclick[2].txt
C:\Users\Trupti\Cookies\Low\trupti@overture[2].txt
C:\Users\Trupti\Cookies\Low\trupti@pcsecuresystem[1].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\trupti@precisionclick[1].txt
C:\Users\Trupti\Cookies\Low\trupti@questionmarket[1].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\[email protected][2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\trupti@specificclick[2].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\[email protected][1].txt
C:\Users\Trupti\Cookies\Low\trupti@tacoda[1].txt
C:\Users\Trupti\Cookies\Low\trupti@zedo[1].txt
C:\Users\Trupti\Cookies\Low\trupti@zedo[3].txt
C:\Users\Trupti\Cookies\trupti@2o7[1].txt
C:\Users\Trupti\Cookies\trupti@2o7[3].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\[email protected][2].txt
C:\Users\Trupti\Cookies\trupti@adbrite[1].txt
C:\Users\Trupti\Cookies\[email protected][2].txt
C:\Users\Trupti\Cookies\trupti@adrevolver[2].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\trupti@advertising[1].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\trupti@apmebf[1].txt
C:\Users\Trupti\Cookies\trupti@apmebf[2].txt
C:\Users\Trupti\Cookies\trupti@atdmt[2].txt
C:\Users\Trupti\Cookies\trupti@atdmt[3].txt
C:\Users\Trupti\Cookies\[email protected][2].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\trupti@casalemedia[2].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\trupti@doubleclick[1].txt
C:\Users\Trupti\Cookies\[email protected][2].txt
C:\Users\Trupti\Cookies\[email protected][2].txt
C:\Users\Trupti\Cookies\[email protected][2].txt
C:\Users\Trupti\Cookies\[email protected][1].txt
C:\Users\Trupti\Cookies\trupti@e-2d
  • 0

#14
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
DSS - Extra Log

Deckard's System Scanner v20071014.68
Extra logfile - please post this as an attachment with your post.
--------------------------------------------------------------------------------

-- System Information ----------------------------------------------------------

Microsoft® Windows Vista™ Home Premium (build 6000)
Architecture: X86; Language: English

CPU 0: AMD Athlon™ 64 X2 Dual Core Processor 5600+
Percentage of Memory in Use: 26%
Physical Memory (total/avail): 2941.88 MiB / 2152.18 MiB
Pagefile Memory (total/avail): 6074.68 MiB / 5251.46 MiB
Virtual Memory (total/avail): 2047.88 MiB / 1903.83 MiB

C: is Fixed (NTFS) - 456.2 GiB total, 417.6 GiB free.
D: is Fixed (NTFS) - 9.56 GiB total, 1.3 GiB free.
E: is CDROM (No Media)
F: is Removable (No Media)
G: is Removable (No Media)
H: is Removable (No Media)
I: is Removable (No Media)

\\.\PHYSICALDRIVE0 - WDC WD50 00AAKS-65YGA SCSI Disk Device - 465.76 GiB - 2 partitions
\PARTITION0 (bootable) - Installable File System - 456.2 GiB - C:
\PARTITION1 - Installable File System - 9.56 GiB - D:

\\.\PHYSICALDRIVE1 - Generic- Compact Flash USB Device

\\.\PHYSICALDRIVE4 - Generic- MS/MS-Pro USB Device

\\.\PHYSICALDRIVE3 - Generic- SD/MMC USB Device

\\.\PHYSICALDRIVE2 - Generic- SM/xD-Picture USB Device



-- Security Center -------------------------------------------------------------

AUOptions is disabled.
Windows Internal Firewall is disabled.

FW: Norton Internet Security v15.0.0.60 (Symantec Corporation) Disabled
AV: Norton Internet Security v15.0.0.60 (Symantec Corporation) Disabled
AS: AdwareAlert v () Disabled
AS: Windows Defender v1.1.1505.0 (Microsoft Corporation) Disabled
AS: SUPERAntiSpyware v4, 15, 0, 1000 (SUPERAntiSpyware.com)
AS: Norton Internet Security v15.0.0.60 (Symantec Corporation) Disabled

[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\\Program Files\\EarthLink TotalAccess\\TaskPanl.exe"="C:\\Program Files\\EarthLink TotalAccess\\TaskPanl.exe:*:Enabled:Earthlink"


-- Environment Variables -------------------------------------------------------

ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\Trupti\AppData\Roaming
CommonProgramFiles=C:\Program Files\Common Files
COMPUTERNAME=TRUPTI-PC
ComSpec=C:\Windows\system32\cmd.exe
FP_NO_HOST_CHECK=NO
HKCU_S=\REGISTRY\CUSER\Software
HKLM_S=\REGISTRY\MACHINE\Software
HOMEDRIVE=C:
HOMEPATH=\Users\Trupti
LOCALAPPDATA=C:\Users\Trupti\AppData\Local
LOGONSERVER=\\TRUPTI-PC
NUMBER_OF_PROCESSORS=2
OnlineServices=Online Services
OS=Windows_NT
Path=C:\Program Files\Internet Explorer;;C:\Windows\system32;C:\Windows;C:\Windows\system32\wbem;C:\hp\bin\Python
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PCBRAND=Pavilion
PLATFORM=HPD
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 15 Model 67 Stepping 3, AuthenticAMD
PROCESSOR_LEVEL=15
PROCESSOR_REVISION=4303
ProgramData=C:\ProgramData
ProgramFiles=C:\Program Files
PROMPT=$P$G
PUBLIC=C:\Users\Public
SESSIONNAME=Console
SystemDrive=C:
SystemRoot=C:\Windows
TEMP=C:\Users\Trupti\AppData\Local\Temp
TMP=C:\Users\Trupti\AppData\Local\Temp
USERDOMAIN=Trupti-PC
USERNAME=Trupti
USERPROFILE=C:\Users\Trupti
windir=C:\Windows


-- User Profiles ---------------------------------------------------------------

Trupti (admin)


-- Add/Remove Programs ---------------------------------------------------------

--> "C:\Program Files\HP Games\3D Ultra Minigolf Adventures\Uninstall.exe"
--> "C:\Program Files\HP Games\7 Wonders of the Ancient World\Uninstall.exe"
--> "C:\Program Files\HP Games\Bejeweled 2 Deluxe\Uninstall.exe"
--> "C:\Program Files\HP Games\Blasterball 2 Revolution\Uninstall.exe"
--> "C:\Program Files\HP Games\Blasterball 3\Uninstall.exe"
--> "C:\Program Files\HP Games\Chuzzle Deluxe\Uninstall.exe"
--> "C:\Program Files\HP Games\Crystal Maze\Uninstall.exe"
--> "C:\Program Files\HP Games\Diner Dash\Uninstall.exe"
--> "C:\Program Files\HP Games\FATE\Uninstall.exe"
--> "C:\Program Files\HP Games\Fish Tycoon\Uninstall.exe"
--> "C:\Program Files\HP Games\Insaniquarium Deluxe\Uninstall.exe"
--> "C:\Program Files\HP Games\Jewel Quest Solitaire\Uninstall.exe"
--> "C:\Program Files\HP Games\Jewel Quest\Uninstall.exe"
--> "C:\Program Files\HP Games\Magic Academy\Uninstall.exe"
--> "C:\Program Files\HP Games\Mah Jong Quest\Uninstall.exe"
--> "C:\Program Files\HP Games\My HP Game Console\Uninstall.exe"
--> "C:\Program Files\HP Games\Otto's Magic Blocks\Uninstall.exe"
--> "C:\Program Files\HP Games\Peggle\Uninstall.exe"
--> "C:\Program Files\HP Games\Penguins!\Uninstall.exe"
--> "C:\Program Files\HP Games\Polar Bowler\Uninstall.exe"
--> "C:\Program Files\HP Games\Polar Golfer Pineapple Cup\Uninstall.exe"
--> "C:\Program Files\HP Games\Polar Golfer\Uninstall.exe"
--> "C:\Program Files\HP Games\Ricochet Lost Worlds\Uninstall.exe"
--> "C:\Program Files\HP Games\Shooting Stars Pool\Uninstall.exe"
--> "C:\Program Files\HP Games\Slingo Deluxe\Uninstall.exe"
--> "C:\Program Files\HP Games\Super Granny\Uninstall.exe"
--> "C:\Program Files\HP Games\Tradewinds\Uninstall.exe"
--> "C:\Program Files\HP Games\Virtual Villagers - A New Home\Uninstall.exe"
--> "C:\Program Files\HP Games\Virtual Villagers - Chapter 2 - The Lost Children\Uninstall.exe"
--> "C:\Program Files\HP Games\Zuma Deluxe\Uninstall.exe"
Ad-Aware --> MsiExec.exe /I{DED53B0B-B67C-4244-AE6A-D6FD3C28D1EF}
Adobe Flash Player ActiveX --> C:\Windows\system32\Macromed\Flash\uninstall_activeX.exe
Adobe Reader 8.1.0 --> MsiExec.exe /I{AC76BA86-7AD7-1033-7B44-A81000000003}
AI RoboForm --> "C:\Program Files\Siber Systems\AI RoboForm\rfwipeout.exe"
µTorrent --> "C:\Program Files\uTorrent\uTorrent.exe" /UNINSTALL
Compatibility Pack for the 2007 Office system --> MsiExec.exe /X{90120000-0020-0409-0000-0000000FF1CE}
CyberLink DVD Suite Deluxe --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}\Setup.exe" -uninstall
DHTML Editing Component --> MsiExec.exe /I{2EA870FA-585F-4187-903D-CB9FFD21E2E0}
Enhanced Multimedia Keyboard Solution --> C:\HP\KBD\Install.exe /u
Hardware Diagnostic Tools --> C:\Program Files\PC-Doctor 5 for Windows\uninst.exe
Hewlett-Packard Active Check --> MsiExec.exe /X{254C37AA-6B72-4300-84F6-98A82419187E}
Hewlett-Packard Asset Agent for Health Check --> MsiExec.exe /X{669D4A35-146B-4314-89F1-1AC3D7B88367}
HijackThis 2.0.2 --> "C:\Program Files\Trend Micro\HijackThis\HijackThis.exe" /uninstall
HP Customer Experience Enhancements --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\PROFES~1\RunTime\11\00\Intel32\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{AFAD41A9-9687-48A3-848F-693C11451433}\setup.exe" -l0x9 -removeonly
HP Customer Feedback --> MsiExec.exe /I{9DBA770F-BF73-4D39-B1DF-6035D95268FC}
HP Easy Setup - Frontend --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\PROFES~1\RunTime\11\00\Intel32\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{9885A11E-60E4-417C-B58B-8B31B21C0B8A}\setup.exe" -l0x9 -removeonly
HP On-Screen Cap/Num/Scroll Lock Indicator --> C:\Windows\system32\OsdRemove.exe
HP Photosmart Essential 2.5 --> C:\Program Files\HP\Digital Imaging\PhotoSmartEssential\hpzscr01.exe -datfile hpqbud13.dat
HP Picasso Media Center Add-In --> MsiExec.exe /I{55979C41-7D6A-49CC-B591-64AC1BBE2C8B}
HP Total Care Advisor --> MsiExec.exe /X{e96b3d28-47d6-43cc-98fd-7069eeab6b11}
HP Update --> MsiExec.exe /X{C8FD5BC1-92EF-4C15-92A9-F9AC7F61985F}
Java™ SE Runtime Environment 6 Update 1 --> MsiExec.exe /I{3248F0A8-6813-11D6-A77B-00B0D0160010}
Kaspersky Online Scanner --> C:\Windows\system32\Kaspersky Lab\Kaspersky Online Scanner\kavuninstall.exe
LabelPrint --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{C59C179C-668D-49A9-B6EA-0121CCFC1243}\Setup.exe" -uninstall
LightScribe System Software 1.10.16.1 --> MsiExec.exe /X{E6CFBFB5-9232-410C-B353-AF6E614B2681}
LightScribe Template Labeler --> MsiExec.exe /X{3EBA6E7C-3DF6-48AE-B87B-4CAFB2C1C3F7}
Malwarebytes' Anti-Malware --> "C:\Program Files\Malwarebytes' Anti-Malware\unins000.exe"
Microsoft Office Access MUI (English) 2007 --> MsiExec.exe /X{90120000-0015-0409-0000-0000000FF1CE}
Microsoft Office Access Setup Metadata MUI (English) 2007 --> MsiExec.exe /X{90120000-0117-0409-0000-0000000FF1CE}
Microsoft Office Excel MUI (English) 2007 --> MsiExec.exe /X{90120000-0016-0409-0000-0000000FF1CE}
Microsoft Office Outlook MUI (English) 2007 --> MsiExec.exe /X{90120000-001A-0409-0000-0000000FF1CE}
Microsoft Office PowerPoint MUI (English) 2007 --> MsiExec.exe /X{90120000-0018-0409-0000-0000000FF1CE}
Microsoft Office Professional 2007 --> "C:\Program Files\Common Files\Microsoft Shared\OFFICE12\Office Setup Controller\setup.exe" /uninstall PROR /dll OSETUP.DLL
Microsoft Office Professional 2007 --> MsiExec.exe /X{91120000-0014-0000-0000-0000000FF1CE}
Microsoft Office Proof (English) 2007 --> MsiExec.exe /X{90120000-001F-0409-0000-0000000FF1CE}
Microsoft Office Proof (French) 2007 --> MsiExec.exe /X{90120000-001F-040C-0000-0000000FF1CE}
Microsoft Office Proof (Spanish) 2007 --> MsiExec.exe /X{90120000-001F-0C0A-0000-0000000FF1CE}
Microsoft Office Proofing (English) 2007 --> MsiExec.exe /X{90120000-002C-0409-0000-0000000FF1CE}
Microsoft Office Publisher MUI (English) 2007 --> MsiExec.exe /X{90120000-0019-0409-0000-0000000FF1CE}
Microsoft Office Shared MUI (English) 2007 --> MsiExec.exe /X{90120000-006E-0409-0000-0000000FF1CE}
Microsoft Office Shared Setup Metadata MUI (English) 2007 --> MsiExec.exe /X{90120000-0115-0409-0000-0000000FF1CE}
Microsoft Office Word MUI (English) 2007 --> MsiExec.exe /X{90120000-001B-0409-0000-0000000FF1CE}
Microsoft Visual C++ 2005 Redistributable --> MsiExec.exe /X{7299052b-02a4-4627-81f2-1818da5d550d}
Microsoft Works --> MsiExec.exe /I{15BC8CD0-A65B-47D0-A2DD-90A824590FA8}
muvee autoProducer 6.1 --> C:\Program Files\InstallShield Installation Information\{E8C2622C-9FF1-4F60-8008-A0208154F9F3}\muveesetup.exe -removeonly -runfromtemp
My HP Games --> "C:\Program Files\HP Games\Uninstall.exe"
NVIDIA Drivers --> C:\Windows\system32\nvunrm.exe UninstallGUI
Power2Go --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{40BF1E83-20EB-11D8-97C5-0009C5020658}\Setup.exe" -uninstall
PowerDirector --> "C:\Program Files\InstallShield Installation Information\{CB099890-1D5F-11D5-9EA9-0050BAE317E1}\setup.exe" /z-uninstall
Python 2.5 --> MsiExec.exe /I{0A2C5854-557E-48C8-835A-3B9F074BDCAA}
Realtek High Definition Audio Driver --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\PROFES~1\RunTime\11\50\Intel32\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}\Setup.exe" -l0x9 -removeonly
Security Update for Excel 2007 (KB946974) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {85E83E2E-AF9B-439B-B4F9-EB9B7EF6A00E}
Security Update for Microsoft Office Publisher 2007 (KB950114) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {F9C3CDBA-1F00-4D4D-959D-75C9D3ACDD85}
Security Update for Microsoft Office system 2007 (KB951808) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {8F375E11-4FD6-4B89-9E2B-A76D48B51E00}
Security Update for Microsoft Office Word 2007 (KB950113) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {AD72BABE-C733-4FCF-9674-4314466191B9}
Security Update for Office 2007 (KB947801) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {02B5A17B-01BE-4BA6-95F1-1CBB46EBC76E}
Security Update for Outlook 2007 (KB946983) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {66B9496E-C0C3-4065-9868-85CCA92126C3}
Snapfish Picture Mover --> MsiExec.exe /X{029B5901-1F27-4347-9923-E8ACC8F54E15}
Soft Data Fax Modem with SmartCP --> C:\Program Files\CONEXANT\CNXT_MODEM_PCI_VEN_14F1&DEV_2F20&SUBSYS_200C14F1\UIU32m.exe -U -ITrx200Cz.INF
SUPERAntiSpyware Free Edition --> MsiExec.exe /X{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}
Turbo Lister 2 --> C:\PROGRA~1\COMMON~1\INSTAL~1\Driver\9\INTEL3~1\IDriver.exe /M{69640730-B830-4C24-BB5C-222DA1260548}
Update for Office 2007 (KB946691) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {A420F522-7395-4872-9882-C591B4B92278}
Update for Outlook 2007 Junk Email Filter (kb950378) --> msiexec /package {91120000-0014-0000-0000-0000000FF1CE} /uninstall {F6296086-AED5-4EC0-938B-08EA0254F20E}
WeatherBug Gadget --> MsiExec.exe /I{209CDA54-D390-46A2-A97C-7BF61734418D}
Windows Live installer --> MsiExec.exe /X{A7E4ECCA-4A8E-4258-8EC8-2DCCF5B11320}
Windows Live Messenger --> MsiExec.exe /X{508CE775-4BA4-4748-82DF-FE28DA9F03B0}
Windows Live Sign-in Assistant --> MsiExec.exe /I{AFA4E5FD-ED70-4D92-99D0-162FD56DC986}
WinRAR archiver --> C:\Program Files\WinRAR\uninstall.exe
Yahoo! Messenger --> C:\PROGRA~1\Yahoo!\MESSEN~1\UNWISE.EXE /U C:\PROGRA~1\Yahoo!\MESSEN~1\INSTALL.LOG


-- Application Event Log -------------------------------------------------------

Event Record #/Type2705 / Error
Event Submitted/Written: 07/02/2008 07:16:30 AM
Event ID/Source: 5007 / WerSvc
Event Description:
The target file for the Windows Feedback Platform (a DLL file containing the list of problems on this computer that require additional data collection for diagnosis) could not be parsed. The error code was 8014FFF9.

Event Record #/Type2702 / Success
Event Submitted/Written: 07/02/2008 07:15:22 AM
Event ID/Source: 12001 / usnjsvc
Event Description:
The Messenger Sharing USN Journal Reader service started successfully.

Event Record #/Type2694 / Success
Event Submitted/Written: 07/02/2008 07:11:48 AM
Event ID/Source: 5617 / WinMgmt
Event Description:


Event Record #/Type2693 / Success
Event Submitted/Written: 07/02/2008 07:11:48 AM
Event ID/Source: 5615 / WinMgmt
Event Description:


Event Record #/Type2691 / Success
Event Submitted/Written: 07/02/2008 07:11:40 AM
Event ID/Source: 902 / Software Licensing Service
Event Description:
The Software Licensing service has started.



-- Security Event Log ----------------------------------------------------------

No Errors/Warnings found.


-- System Event Log ------------------------------------------------------------

Event Record #/Type12776 / Error
Event Submitted/Written: 07/02/2008 07:13:17 AM
Event ID/Source: 7026 / Service Control Manager
Event Description:
i8042prt

Event Record #/Type12744 / Error
Event Submitted/Written: 07/02/2008 07:13:17 AM
Event ID/Source: 7000 / Service Control Manager
Event Description:
Parallel port driver%%1058

Event Record #/Type12703 / Error
Event Submitted/Written: 07/02/2008 07:11:16 AM
Event ID/Source: 6 / ACPI
Event Description:
IRQARB: ACPI BIOS does not contain an IRQ for the device in PCI slot 11, function 0.
Please contact your system vendor for technical assistance.

Event Record #/Type12702 / Error
Event Submitted/Written: 07/02/2008 07:11:16 AM
Event ID/Source: 6 / ACPI
Event Description:
IRQARB: ACPI BIOS does not contain an IRQ for the device in PCI slot 9, function 0.
Please contact your system vendor for technical assistance.

Event Record #/Type12578 / Error
Event Submitted/Written: 07/01/2008 02:07:09 PM
Event ID/Source: 7026 / Service Control Manager
Event Description:
i8042prt
vkquwexg



-- End of Deckard's System Scanner: finished at 2008-07-02 07:19:41 ------------
  • 0

#15
Truptisaurusrex

Truptisaurusrex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
DSS - Main Log

Deckard's System Scanner v20071014.68
Run by Trupti on 2008-07-02 07:18:14
Computer is in Normal Mode.
--------------------------------------------------------------------------------

-- Last 5 Restore Point(s) --
6: 2008-07-02 01:12:10 UTC - RP49 - Installed SUPERAntiSpyware Free Edition
5: 2008-07-01 18:02:02 UTC - RP48 - ComboFix created restore point
4: 2008-07-01 17:25:28 UTC - RP47 - Scheduled Checkpoint
3: 2008-06-30 18:19:37 UTC - RP46 - ComboFix created restore point
2: 2008-06-30 14:01:37 UTC - RP45 - Removed LiveUpdate (Symantec Corporation)


-- First Restore Point --
1: 2008-06-29 13:29:01 UTC - RP44 - Installed Ad-Aware


Backed up registry hives.
Performed disk cleanup.



-- HijackThis (run as Trupti.exe) ----------------------------------------------

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:19:08 AM, on 02/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16681)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\hp\support\hpsysdrv.exe
C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe
C:\Windows\System32\rundll32.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Siber Systems\AI RoboForm\robotaskbaricon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\system32\schtasks.exe
C:\hp\kbd\kbd.exe
C:\Users\Trupti\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MOUYRYD5\dss[1].exe
C:\Windows\system32\conime.exe
C:\Windows\system32\DllHost.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Trupti.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O4 - HKLM\..\Run: [hpsysdrv] c:\hp\support\hpsysdrv.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KbdStub.EXE
O4 - HKLM\..\Run: [OsdMaestro] "C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe"
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [HP Health Check Scheduler] [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [SunJavaUpdateReg] "C:\Windows\system32\jureg.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [RoboForm] "C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe"
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O13 - Gopher Prefix:
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - c:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: VundoFix Service (VundoFixSvc) - Atribune.org - C:\Windows\SYSTEM32\VundoFixSVC.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 6684 bytes

-- HijackThis Fixed Entries (C:\PROGRA~1\TRENDM~1\HIJACK~1\backups\) -----------

backup-20080701-204251-896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.h...a...&pf=desktop

-- File Associations -----------------------------------------------------------

.cpl - cplfile - shell\cplopen\command - rundll32.exe shell32.dll,Control_RunDLL "%1",%*
.reg - regfile - shell\open\command - regedit.exe "%1" %*
.scr - scrfile - shell\open\command - "%1" %*


-- Drivers: 0-Boot, 1-System, 2-Auto, 3-Demand, 4-Disabled ---------------------

All drivers whitelisted.


-- Services: 0-Boot, 1-System, 2-Auto, 3-Demand, 4-Disabled --------------------

R2 HP Health Check Service - "c:\program files\hewlett-packard\hp health check\hphc_service.exe" <Not Verified; Hewlett-Packard; HP Health Check Service>

S3 VundoFixSvc (VundoFix Service) - vundofixsvc.exe <Not Verified; Atribune.org; Vundofix Service>


-- Device Manager: Disabled ----------------------------------------------------

No disabled devices found.


-- Scheduled Tasks -------------------------------------------------------------

2008-07-01 22:29:19 420 --ah----- C:\Windows\Tasks\User_Feed_Synchronization-{F5D1D9D1-2670-46C8-833D-B4F80856E51B}.job


-- Files created between 2008-06-02 and 2008-07-02 -----------------------------

2008-07-01 21:12:47 0 d-------- C:\Users\All Users\SUPERAntiSpyware.com
2008-07-01 21:12:29 0 d-------- C:\Program Files\SUPERAntiSpyware
2008-07-01 20:45:50 0 d-------- C:\Users\All Users\Malwarebytes
2008-07-01 20:45:49 0 d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-07-01 14:32:59 0 d-------- C:\Users\All Users\Kaspersky Lab
2008-07-01 14:32:58 0 d-------- C:\Windows\system32\Kaspersky Lab
2008-06-30 19:56:24 0 d-------- C:\Users\All Users\Yahoo!
2008-06-30 19:54:37 0 d-------- C:\Program Files\Yahoo!
2008-06-29 09:29:21 0 d-------- C:\Users\All Users\Lavasoft
2008-06-29 09:29:21 0 d-------- C:\Program Files\Lavasoft
2008-06-29 09:28:36 0 d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-06-28 22:13:33 0 d-------- C:\Program Files\Common Files\PX Storage Engine
2008-06-28 22:13:27 0 d-------- C:\Program Files\DivX
2008-06-28 17:51:14 0 d-------- C:\Users\All Users\Spybot - Search & Destroy
2008-06-28 15:25:05 0 d-------- C:\Users\Trupti\.housecall6.6
2008-06-28 15:24:47 0 d-------- C:\Windows\Sun
2008-06-28 14:51:14 262144 --a------ C:\ntuser.dat
2008-06-28 11:48:43 0 d-------- C:\Program Files\Trend Micro
2008-06-28 09:44:44 24576 --a------ C:\Windows\system32\VundoFixSVC.exe <Not Verified; Atribune.org; Vundofix Service>
2008-06-28 08:45:19 0 d-------- C:\VundoFix Backups
2008-06-28 08:11:28 103424 --a------ C:\Windows\system32\yqniah.dll
2008-06-27 14:45:14 286720 -----n--- C:\Windows\Setup1.exe <Not Verified; Microsoft Corporation; Microsoft Visual Basic for Windows>
2008-06-27 14:45:13 73216 --a------ C:\Windows\ST6UNST.EXE <Not Verified; Microsoft Corporation; Microsoft® Visual Basic for Windows>
2008-06-25 18:13:35 0 d-------- C:\Program Files\Logitech
2008-06-25 18:12:08 0 d-------- C:\Program Files\Jasc Software Inc
2008-06-25 09:34:25 0 d-------- C:\Program Files\uTorrent
2008-06-25 09:12:57 0 d-------- C:\Users\All Users\RoboForm
2008-06-24 18:21:03 0 d-------- C:\Program Files\Microsoft.NET
2008-06-24 18:18:03 0 d-------- C:\Users\All Users\Microsoft Help
2008-06-24 18:17:30 0 dr-h----- C:\MSOCache
2008-06-24 15:57:17 0 d-a------ C:\Users\All Users\TEMP
2008-06-24 15:52:07 0 d-------- C:\My Downloads
2008-06-24 11:26:05 0 d-------- C:\Program Files\The Font Thing
2008-06-24 11:25:39 0 d-------- C:\Program Files\XP Codec Pack
2008-06-24 11:24:54 0 d-------- C:\Program Files\Siber Systems
2008-06-24 11:13:05 0 d-------- C:\Program Files\FTP Surfer
2008-06-23 14:20:14 0 d-------- C:\Windows\PCHEALTH
2008-06-23 14:17:22 0 d--hs--c- C:\Program Files\Common Files\WindowsLiveInstaller
2008-06-23 14:17:04 0 d-------- C:\Program Files\Windows Live
2008-06-23 14:16:24 0 d-------- C:\Users\All Users\WLInstaller
2008-06-23 13:58:55 0 d-------- C:\Users\All Users\CyberLink
2008-06-23 13:54:00 0 d-------- C:\Users\All Users\eBay
2008-06-23 13:54:00 0 d-------- C:\Program Files\eBay
2008-06-23 13:44:22 0 d-------- C:\Windows\OvtCam
2008-06-23 13:32:52 0 dr------- C:\Users\Trupti\Searches
2008-06-23 13:32:41 0 dr------- C:\Users\Trupti\Contacts
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\Templates
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\Start Menu
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\SendTo
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\Recent
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\PrintHood
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\NetHood
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\My Documents
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\Local Settings
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\Cookies
2008-06-23 13:28:32 0 d--hs---- C:\Users\Trupti\Application Data
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Videos
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Saved Games
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Pictures
2008-06-23 13:28:31 1835008 --ahs---- C:\Users\Trupti\NTUSER.DAT
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Music
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Links
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Favorites
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Downloads
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Documents
2008-06-23 13:28:31 0 dr------- C:\Users\Trupti\Desktop
2008-06-23 13:28:31 0 d--h----- C:\Users\Trupti\AppData
2008-06-23 09:54:35 44 --a------ C:\Windows\system\hpsysdrv.dat
2008-06-23 09:46:57 0 d-------- C:\Windows\SoftwareDistribution


-- Find3M Report ---------------------------------------------------------------

2008-07-01 21:12:29 0 d-------- C:\Users\Trupti\AppData\Roaming\SUPERAntiSpyware.com
2008-07-01 20:45:52 0 d-------- C:\Users\Trupti\AppData\Roaming\Malwarebytes
2008-06-30 19:56:24 0 d-------- C:\Users\Trupti\AppData\Roaming\Adobe
2008-06-30 10:13:20 0 d-------- C:\Program Files\Common Files\Symantec Shared
2008-06-30 10:10:57 0 d-------- C:\Program Files\Common Files
2008-06-28 22:14:04 0 d-------- C:\Users\Trupti\AppData\Roaming\DivX
2008-06-27 12:32:38 1966 --a------ C:\Users\Trupti\AppData\Roaming\wklnhst.dat
2008-06-26 08:47:19 0 d-------- C:\Users\Trupti\AppData\Roaming\uTorrent
2008-06-25 18:10:57 0 d-------- C:\Users\Trupti\AppData\Roaming\Jasc Software Inc
2008-06-24 18:01:55 0 d-------- C:\Users\Trupti\AppData\Roaming\WinRAR
2008-06-24 15:58:29 0 d-------- C:\Users\Trupti\AppData\Roaming\muvee Technologies
2008-06-24 13:54:53 0 d-------- C:\Users\Trupti\AppData\Roaming\WildTangent
2008-06-24 11:10:45 0 d-------- C:\Program Files\Movie Maker
2008-06-23 21:27:14 0 d-------- C:\Users\Trupti\AppData\Roaming\Template
2008-06-23 14:04:50 0 d-------- C:\Program Files\Windows Mail
2008-06-23 14:04:49 0 d-------- C:\Program Files\Windows Sidebar
2008-06-23 13:58:54 0 d-------- C:\Users\Trupti\AppData\Roaming\CyberLink
2008-06-23 13:54:54 0 d-------- C:\Users\Trupti\AppData\Roaming\WinBatch
2008-06-23 13:54:07 0 d--h----- C:\Program Files\InstallShield Installation Information
2008-06-23 13:34:14 0 d-------- C:\Users\Trupti\AppData\Roaming\Hewlett-Packard
2008-06-23 13:33:28 0 d-------- C:\Users\Trupti\AppData\Roaming\Symantec
2008-06-23 13:33:22 0 d-------- C:\Users\Trupti\AppData\Roaming\Snapfish
2008-06-23 13:32:45 0 d-------- C:\Users\Trupti\AppData\Roaming\Identities
2008-06-23 13:31:02 0 d-------- C:\Users\Trupti\AppData\Roaming\Macromedia
2008-05-20 10:47:10 1044480 -ra------ C:\Windows\system32\roboex32.dll <Not Verified; eHelp Corporation.; RoboHELP for WinHelp 9.2>
2008-05-20 10:47:10 49152 -ra------ C:\Windows\system32\inetwh32.dll <Not Verified; Blue Sky Software Corporation.; Blue Sky Software - INETWH32>


-- Registry Dump ---------------------------------------------------------------

*Note* empty entries & legit default entries are not shown


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"hpsysdrv"="c:\hp\support\hpsysdrv.exe" [18/04/2007 11:01 AM]
"KBD"="C:\HP\KBD\KbdStub.EXE" [08/12/2006 12:16 PM]
"OsdMaestro"="C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe" [15/02/2007 07:59 AM]
"NvSvc"="C:\Windows\system32\nvsvc.dll" [06/07/2007 09:45 PM]
"NvCplDaemon"="C:\Windows\system32\NvCpl.dll" [06/07/2007 09:45 PM]
"NvMediaCenter"="C:\Windows\system32\NvMcTray.dll" [06/07/2007 09:45 PM]
"RtHDVCpl"="RtHDVCpl.exe" [15/01/2008 11:26 AM C:\Windows\RtHDVCpl.exe]
"HP Health Check Scheduler"="[ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe" []
"SunJavaUpdateReg"="C:\Windows\system32\jureg.exe" [07/04/2007 06:56 AM]
"HP Software Update"="C:\Program Files\HP\HP Software Update\HPWuSchd2.exe" [08/05/2007 04:24 PM]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [23/06/2008 01:41 PM]
"RoboForm"="C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe" [26/06/2008 08:43 AM]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [02/11/2006 08:36 AM]
"msnmsgr"="C:\Program Files\Windows Live\Messenger\msnmsgr.exe" [24/06/2008 01:51 PM]
"Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [30/08/2007 05:43 PM]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [28/05/2008 10:33 AM]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce]
"Launcher"=%WINDIR%\SMINST\launcher.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"=2 (0x2)
"EnableLUA"=0 (0x0)
"DisableRegistryTools"=0 (0x0)
"HideLegacyLogonScripts"=0 (0x0)
"HideLogoffScripts"=0 (0x0)
"RunLogonScriptSync"=1 (0x1)
"RunStartupScriptSync"=0 (0x0)
"HideStartupScripts"=0 (0x0)

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"HideLegacyLogonScripts"=0 (0x0)
"HideLogoffScripts"=0 (0x0)
"RunLogonScriptSync"=1 (0x1)
"RunStartupScriptSync"=0 (0x0)
"HideStartupScripts"=0 (0x0)
"DisableRegistryTools"=0 (0x0)

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [13/05/2008 10:13 AM 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 19/04/2007 01:41 PM 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\aawservice]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\AppInfo]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\KeyIso]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NTDS]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ProfSvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sacsvr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SWPRV]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\TabletInputService]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\TBS]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\TrustedInstaller]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\VDS]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\volmgr.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\volmgrx.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{533C5B84-EC70-11D2-9505-00C04F79DEAF}]
@="Volume shadow copy"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{6BDD1FC1-810F-11D0-BEC7-08002BE2092F}]
@="IEEE 1394 Bus host controllers"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{D48179BE-EC20-11D1-B6B8-00C04FA372A7}]
@="SBP2 IEEE 1394 Devices"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{D94EE5D8-D189-4994-83D2-F68D7D41B0E6}]
@="SecurityDevices"

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalSystemNetworkRestricted hidserv UxSms WdiSystemHost Netman trkwks AudioEndpointBuilder WUDFSvc irmon sysmain IPBusEnum dot3svc PcaSvc EMDMgmt TabletInputService wlansvc WPDBusEnum


[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}]
C:\Windows\system32\unregmp2.exe /ShowWMP

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}]
%SystemRoot%\system32\unregmp2.exe /FirstLogon /Shortcuts /RegBrowsers /ResetMUI



-- End of Deckard's System Scanner: finished at 2008-07-02 07:19:41 ------------
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP