ads out of hand--25 a second please check hjt log

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
any help is greatly appreciated system specs given in sig if needed




Logfile of HijackThis v1.99.1
Scan saved at 1:17:13 PM, on 7/17/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
C:\Program Files\TizzleTalk\TizzleTalk.exe
C:\WINDOWS\System32\devldr32.exe
C:\Program Files\Cas\Client\casclient.exe
C:\Program Files\NETGEAR WG311v2 Adapter\wlancfg5.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE
C:\Program Files\ssus\erwr.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\System32\rundll32.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\default\Local Settings\Temp\Temporary Directory 2 for hijackthis[1].zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://desktop.presario.net/scripts.../deskredir2.dll?s=consumericon&c=2C01&lc=0409
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://desktop.presario.net/scripts.../deskredir2.dll?s=consumericon&c=2C01&lc=0409
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
O2 - BHO: rxh - {19AD8203-1538-43a0-848B-D136782E09DE} - C:\Program Files\Fireworks Screensaver\rxh2.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TizzleTalk] C:\Program Files\TizzleTalk\TizzleTalk.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q
O4 - HKCU\..\Run: [Rpt] C:\WINDOWS\System32\?ystem\scanregw.exe
O4 - HKCU\..\Run: [CAS Client] "C:\Program Files\Cas\Client\casclient.exe"
O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE"
O4 - HKCU\..\Run: [Etwc] C:\Program Files\ssus\erwr.exe
O4 - Global Startup: NETGEAR WG311v2 Smart Configuration.lnk = C:\Program Files\NETGEAR WG311v2 Adapter\wlancfg5.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=36467&clcid=0x409
O18 - Filter: text/html - {8293D547-38DD-4325-B35A-F1817EDFA5FC} - C:\Program Files\Cas\Client\casmf.dll
O20 - Winlogon Notify: OpenGLdrivers - C:\WINDOWS\system32\okbcji32.dll






its getting almost unbearable to use my computer please help
 

Cookiegal

Karen
Administrator
Malware Specialist Coordinator
Joined
Aug 27, 2003
Messages
120,254
Please move HijackThis into a separate folder of its own in program files or my documents but not in the temporary files, so that it can create proper back-ups which can be restored, if necessary.



Please download and run the following program(s):

AD-AWARE

Go here and download Ad-Aware SE.

Install the program and launch it.

First, in the main window look in the bottom right corner and click on Check for updates now then click Connect and download the latest reference files.

From the main window, click Start then under Select a scan Mode tick Perform full system scan.

Next, deselect Search for negligible risk entries.

Now to perform a scan, click the Next button.

When the scan is finished, mark everything for removal and get rid of it. To do so, right-click in the window and choose select all from the drop down menu and then click Next)

Restart your computer.


SPYBOT SEARCH & DESTROY

Go here and download Spybot Search & Destroy.

Install the program and launch it.

Before scanning press Online and Search for Updates .

Put a check mark at and install all updates.

Click Check for Problems and when the scan is finished let Spybot fix/remove all it finds marked in RED.

Restart your computer.


here to download CCleaner.
  • Install CCleaner
  • Launch CCleaner and look in the upper right corner and click on the "Options" button.
  • Click "Advanced" and remove the check by "Only delete files in Windows temp folders older than 48 hours".
  • Click OK
  • Do not run CCleaner yet. You will run it later in safe mode.


Download the trial version of Ewido Security Suite here.
  • Install ewido.
  • During the installation, under "Additional Options" uncheck "Install background guard" and "Install scan via context menu".
  • Launch ewido
  • It will prompt you to update click the OK button and it will go to the main screen
  • On the left side of the main screen click update
  • Click on Start and let it update.
  • DO NOT run a scan yet. You will do that later in safe mode.

Click here for info on how to boot to safe mode if you don't already know how.


Now copy these instructions to notepad and save them to your desktop. You will need them to refer to in safe mode.


Restart your computer into safe mode now. Perform the following steps in safe mode:


* Run Ewido:
  • Click on scanner
  • Click Complete System Scan and the scan will begin.
  • During the scan it will prompt you to clean files, click OK
  • When the scan is finished, look at the bottom of the screen and click the Save report button.
  • Save the report to your desktop.

Start CCleaner and click Run Cleaner


Go to Control Panel - Internet Options. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.


Restart back into Windows normally now.


Do aPanda Active Scan. Be sure to save the log it creates.


Come back here and post a new HijackThis log, as well as the logs from the Ewido scan and Panda scans.
 

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
my computer has shown drastic improvement in performance and popups not from websites are definitly existant, but are at a minimum.

NEW LOGS:

---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 10:51:30 AM, 7/18/2005
+ Report-Checksum: C99C774B

+ Scan result:

C:\WINDOWS\SYSTEM32\dfnlobby.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\pi1_60.exe -> TrojanDownloader.Small.aal : Cleaned with backup
C:\WINDOWS\SYSTEM32\kqdlt1.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mdvcr71.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mvnetobj.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\lUngwrbk.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\kedpo.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\sgprv.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\tkpmonui.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\VBHELPER.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\miconf.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\vbsapi.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\dqime.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\tyrmsrv.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\cPtsrvps.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\dxocx.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mooeacct.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\oae2nls.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\pvotowiz.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ucandlg.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\wwbvw.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\lxfil11n.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\lufil11n.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\pfsetup.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\nadmcpl.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mtrd2x40.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ddsetup.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\dysrslvr.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\nutui0.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\noinstnt.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\sylfx.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\nEdmcpl.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mwrd2x40.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\lpbmp11n.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\lhkrn11n.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mxdxmlc.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\lhcalui.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\doserial.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\diauth.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ipmfilter.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\szhedsvc.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\cKtsrvps.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\muxlegih.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\shdll.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\sbsbkup.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\owecli32.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mgr.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ijwphbk.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ibrdbg32.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\oobcjt32.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\oyedlg.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\iuetpp.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\metlsapi.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\kcdnec.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\kmdit142.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ctbcatex.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\cnmrepl.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\okbcji32.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\purfnet.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ijctl.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ltcmgr10.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\dmu11.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\qhgrprxy.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\uzildll.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\vrs_ps.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\IQAGING.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\NIONN32.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\wkadefui.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\wfnsock.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\FqsVpn.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\SltAid.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mzdtcuiu.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\djnlobby.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\fGultrep.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\pabase.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ixsetup.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\ihput.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\smrmdll.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\wgvdmoe.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\jibexec.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\kddbr.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\infgnt5.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\mhcndmgr.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\hkink.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\huui.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\rwcdll.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\SYSTEM32\rQsppp.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\WINDOWS\tgymewnz.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.BookedSpace : Cleaned with backup
C:\WINDOWS\ru.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.PurityScan : Cleaned with backup
C:\WINDOWS\LastGood\system32\dgconfig.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\Program Files\CasStub\casstub.exe -> TrojanDownloader.Agent.qg : Cleaned with backup
C:\compaq\lutil\WizHost.exe -> Heuristic.Win32.Dialer : Cleaned with backup
C:\TEMP\Installer.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP4\A0002643.dLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP6\A0002678.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP6\A0002680.exe -> TrojanDownloader.Adload.a : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP7\A0002790.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP7\A0002801.dll -> Heuristic.Win32.Hijacker1 : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP7\A0003744.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP7\A0003759.dll -> Heuristic.Win32.Hijacker1 : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP7\A0003774.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP8\A0003806.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0004798.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0005802.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0006804.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0007802.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0008808.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0009804.DLL -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0010811.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0010825.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP10\A0010843.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP12\A0010864.DLL -> TrojanDownloader.Braidupdate.d : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP12\A0010868.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP20\A0010958.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.CashBack : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP20\A0010974.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=51' target='_blank'>adware</a>.BetterInternet : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP20\A0010976.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=51' target='_blank'>adware</a>.BetterInternet : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP20\A0010978.exe -> TrojanDownloader.Adload.a : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP20\A0010979.EXE -> TrojanDownloader.Agent.qg : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP20\A0010997.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.PurityScan : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP22\A0011014.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP22\A0011019.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.BargainBuddy : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP22\A0011020.exe -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.BargainBuddy : Cleaned with backup
C:\System Volume Information\_restore{E9A8D06A-295D-4C66-BFCB-496BC45F9610}\RP25\A0011059.dll -> <a href='http://consumeralertsystem.com/cas/zx-hclick.php?hid=50' target='_blank'>spyware</a>.Look2Me : Cleaned with backup


::Report End::
 

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
IE Temporary Internet Files (2535 files) 21.6MB
Cookie:[email protected]/(&H100001) 677 bytes
Cookie:[email protected]/(&H100001) 300 bytes
Cookie:[email protected]/(&H100001) 75 bytes
Cookie:[email protected]/(&H100001) 78 bytes
Cookie:[email protected]/(&H100001) 109 bytes
Cookie:[email protected]/(&H100001) 83 bytes
Cookie:[email protected]/(&H100001) 98 bytes
Cookie:[email protected]/(&H100001) 70 bytes
Cookie:[email protected]/(&H100001) 83 bytes
Cookie:[email protected]/(&H100001) 253 bytes
Cookie:[email protected]/(&H100001) 757 bytes
Cookie:[email protected]/(&H100001) 205 bytes
Cookie:[email protected]/(&H100001) 135 bytes
Cookie:[email protected]/(&H100001) 145 bytes
Cookie:[email protected]/(&H100001) 98 bytes
Cookie:[email protected]/(&H100001) 682 bytes
Cookie:[email protected]/(&H100001) 353 bytes
Cookie:[email protected]/(&H100001) 608 bytes
Cookie:[email protected]/(&H100001) 97 bytes
Cookie:[email protected]/(&H100001) 348 bytes
Cookie:[email protected]/(&H100001) 373 bytes
Cookie:[email protected]/(&H100001) 150 bytes
Cookie:[email protected]/(&H100001) 118 bytes
Cookie:[email protected]/(&H100001) 385 bytes
Cookie:[email protected]/(&H100001) 108 bytes
Cookie:[email protected]/(&H100001) 90 bytes
Cookie:[email protected]/(&H100001) 260 bytes
Cookie:[email protected]/(&H100001) 136 bytes
Cookie:[email protected]/(&H100001) 100 bytes
Cookie:[email protected]/(&H100001) 637 bytes
Cookie:[email protected]/(&H100001) 121 bytes
Cookie:[email protected]/(&H100001) 99 bytes
Cookie:[email protected]/(&H100001) 520 bytes
Cookie:[email protected]/(&H100001) 323 bytes
Cookie:[email protected]/(&H100001) 884 bytes
Cookie:[email protected]/(&H100001) 314 bytes
Cookie:[email protected]/serviceswitching/(&H100001) 124 bytes
Cookie:[email protected]/(&H100001) 406 bytes
Cookie:[email protected]/(&H100001) 231 bytes
Cookie:[email protected]/(&H100001) 183 bytes
Cookie:[email protected]/(&H100001) 148 bytes
Cookie:[email protected]/(&H100001) 122 bytes
Cookie:[email protected]/(&H100001) 105 bytes
Cookie:[email protected]/(&H100001) 221 bytes
Cookie:[email protected]/(&H100001) 83 bytes
Cookie:[email protected]/(&H100001) 313 bytes
Cookie:[email protected]/(&H100001) 263 bytes
Cookie:[email protected]/(&H100001) 169 bytes
Cookie:[email protected]/hc/80503492(&H100001) 255 bytes
Cookie:[email protected]/(&H100001) 140 bytes
Cookie:[email protected]/(&H100001) 230 bytes
Cookie:[email protected]/(&H100001) 98 bytes
Cookie:[email protected]/(&H100001) 98 bytes
Cookie:[email protected]/(&H100001) 319 bytes
Cookie:[email protected]/(&H100001) 114 bytes
Cookie:[email protected]/(&H100001) 155 bytes
Cookie:[email protected]/(&H100001) 188 bytes
Cookie:[email protected]/rtm(&H100001) 240 bytes
Cookie:[email protected]/(&H100001) 175 bytes
Cookie:[email protected]/(&H100001) 104 bytes
C:\Documents and Settings\default\Local Settings\History\History.IE5\desktop.ini 113 bytes
C:\Documents and Settings\default\Local Settings\History\History.IE5\index (1).dat 32.00KB
C:\Documents and Settings\default\Local Settings\History\History.IE5\desktop (1).ini 113 bytes
Marked for deletion: C:\Documents and Settings\default\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Marked for deletion: C:\Documents and Settings\default\Cookies\index.dat
Marked for deletion: C:\Documents and Settings\default\Local Settings\History\History.IE5\index.dat
Emptied Recycle Bin (2 files) 2.21KB
C:\WINDOWS\TEMP\_ISTMP1.DIR\_INS5576._MP 0.53MB
C:\WINDOWS\TEMP\_ISTMP1.DIR\ZDataI51.dll 20.00KB
C:\WINDOWS\TEMP\_0105cl_\DATA.TAG 150 bytes
C:\WINDOWS\TEMP\_0105cl_\data1.cab 0.41MB
C:\WINDOWS\TEMP\_0105cl_\data1.hdr 0.11MB
C:\WINDOWS\TEMP\_0105cl_\data2.cab 0.59MB
C:\WINDOWS\TEMP\_0105cl_\infupd.bmp 75.17KB
C:\WINDOWS\TEMP\_0105cl_\LANG.DAT 23.66KB
C:\WINDOWS\TEMP\_0105cl_\layout.bin 690 bytes
C:\WINDOWS\TEMP\_0105cl_\os.dat 450 bytes
C:\WINDOWS\TEMP\_0105cl_\Readme.txt 30.32KB
C:\WINDOWS\TEMP\_0105cl_\SETUP.INI 61 bytes
C:\WINDOWS\TEMP\_0105cl_\_INST32I.EX_ 0.28MB
C:\WINDOWS\TEMP\_0105cl_\Setup.exe 72.00KB
C:\WINDOWS\TEMP\_0105cl_\setup.ins 101.13KB
C:\WINDOWS\TEMP\_0105cl_\setup.iss 346 bytes
C:\WINDOWS\TEMP\_0105cl_\setup.lid 49 bytes
C:\WINDOWS\TEMP\_0105cl_\_Setup.dll 34.00KB
C:\WINDOWS\TEMP\_0105cl_\_ISDel.exe 27.00KB
C:\WINDOWS\TEMP\_0105cl_\_sys1.cab 0.17MB
C:\WINDOWS\TEMP\_0105cl_\_sys1.hdr 4.10KB
C:\WINDOWS\TEMP\_0105cl_\_user1.cab 43.87KB
C:\WINDOWS\TEMP\_0105cl_\_user1.hdr 4.58KB
C:\WINDOWS\TEMP\_0105cl_\setup.log 58 bytes
C:\WINDOWS\TEMP\Wallpaper.reg 270 bytes
C:\WINDOWS\TEMP\Colors.reg 87 bytes
C:\WINDOWS\TEMP\Desktop.htt 1.27KB
C:\WINDOWS\TEMP\Gemplus\Gcr432.cat 7.00KB
C:\WINDOWS\TEMP\Gemplus\Gcr432.sys 87.28KB
C:\WINDOWS\TEMP\msievent.log 1.19KB
C:\WINDOWS\TEMP\SETF2D3.TMP 53.00KB
C:\WINDOWS\TEMP\msnclean.log 33.39KB
C:\WINDOWS\TEMP\hcupdate.log 20.37KB
C:\WINDOWS\TEMP\setC070.TMP 35.00KB
C:\WINDOWS\TEMP\setC3A0.TMP 45.00KB
C:\WINDOWS\TEMP\upd208.exe 0.33MB
C:\WINDOWS\TEMP\set2081.TMP 45.00KB
C:\WINDOWS\TEMP\upd206.exe 0.33MB
C:\WINDOWS\TEMP\upd207.exe 0.33MB
C:\WINDOWS\TEMP\cassetup.exe 0.21MB
C:\WINDOWS\TEMP\!update.exe 65.00KB
C:\WINDOWS\TEMP\load.html 172 bytes
C:\WINDOWS\TEMP\_avast4_\PxB198.tmp 4.06MB
C:\WINDOWS\TEMP\JET74ED.tmp 0 bytes
C:\WINDOWS\TEMP\JET835C.tmp 0 bytes
C:\WINDOWS\TEMP\JET738C.tmp 0 bytes
C:\WINDOWS\TEMP\JET7A1F.tmp 0 bytes
C:\WINDOWS\TEMP\JET61CB.tmp 0 bytes
C:\WINDOWS\TEMP\JET671D.tmp 0 bytes
C:\WINDOWS\TEMP\JET6AE9.tmp 0 bytes
C:\WINDOWS\TEMP\JET7579.tmp 0 bytes
C:\WINDOWS\TEMP\JET9DBA.tmp 0 bytes
C:\WINDOWS\TEMP\JETA3C0.tmp 0 bytes
C:\WINDOWS\TEMP\JETABF7.tmp 0 bytes
C:\WINDOWS\TEMP\JETB8B7.tmp 0 bytes
C:\WINDOWS\TEMP\JETAF7C.tmp 0 bytes
C:\WINDOWS\TEMP\JETB994.tmp 0 bytes
C:\WINDOWS\TEMP\b.com 64.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\index.dat 80.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\desktop.ini 67 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\desktop.ini 67 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\search[1].m 7.96KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\fwlink[1] 4.04KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\icon_15x15[1].png 725 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\wmp10_musicd_icon_16x16[1].png 3.26KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\menuimage[1].gif 537 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\OOB1028[1].js 4.59KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\ip1012[1].js 2.09KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\JORCF]LWPB4,3WV260KA2E[1].jpg 13.59KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\4UAE47!DNK21GCE5N5FJQO[1].jpg 11.04KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\[_+HGKRDV!3W{E4VR85YCS[1].jpg 1.90KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\fs[1].gif 441 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\d1e2fe[1].gif 35 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\results[1].htm 12.47KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\sbtnbk[1].gif 146 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\hgrad[1].gif 1.42KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\nav_first[1].gif 1.01KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\index[1].cfm 1.96KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\sniffer[1].swf 438 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\img_home_copy[1].gif 3.11KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\spacer[1].gif 43 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\btn_rider_report[1].gif 15.16KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\btn_games[1].gif 3.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\btn_link_to_truth-over[1].gif 2.38KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\btn_find_facts-over[1].gif 15.33KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\hdr_findfacts[1].gif 3.41KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\btn_add_to_cart[1].gif 1.81KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\foot_contact[1].gif 1.56KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\index[2].cfm 12.20KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\whattya[1].js 2.11KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\ans2[1].jpg 945 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\X1OLR058\index[3].cfm 14.84KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\desktop.ini 67 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\1x1[1].gif 43 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\msnlogo[1].png 18.29KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\servicexml[1].aspx 1.50KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\movielink-icon_15x15[1].png 365 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\menuicon[1].jpg 4.90KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\hp1021[1].css 11.63KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\hp1021[1].js 4.45KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\I3-62WS]1I1B~7Y}_1~{B4[1].jpg 8.99KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\HSK}K]ZXSX4-CIR41GL7H[1].jpg 2.45KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\M~1FP[_!,5{RX_]70}PMW[1].jpg 1.99KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\0`[email protected]_8{EZ`IJJ,[1].gif 9.99KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\2G5QK4QRAQ6LHA,5EXZTW[1].swf 6.97KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\common[2].css 37.58KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\bullet[1].gif 43 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\search[1] 17.53KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\nav_page[1].gif 373 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\botm[1].js 1.87KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\index[1].cfm 12.27KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\btn_link_to_ticket[1].gif 3.81KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\btn_email[1].gif 1.74KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\btn_downloads[1].gif 3.16KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\btn_fair_enough[1].gif 84.65KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\lp[1].swf 17.02KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\TicketGiveawayCINDY[1].swf 63.37KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\checkall2[1].js 340 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\foot_email[1].gif 1.79KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\foot_logo[1].gif 1.75KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\index[2].cfm 10.89KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\hdr_whattayouthink[1].gif 3.63KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\XRVVUVTX\readAns-over[1].jpg 2.86KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\desktop.ini 67 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\search2[1].gif 1.71KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\logo_kitty_16x16[1].png 843 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\MNdisc_16x16[1].png 857 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\16_16_ico[1].gif 616 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\sm_menu_logo[1].png 611 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\fye_multiicon_16x16[1].png 845 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\cinemanowxmlM[1].png 969 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\menuicon[1].png 429 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\audible_a_icon_15T[1].png 1.10KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\GYJJBVDH_}[email protected]}9X}[1].jpg 2.48KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\[email protected]!M0-5UGQTD}][email protected][1].gif 1.65KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\0000002609_000000000000000172426[1].swf 19.29KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\common[2].js 27.25KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\mgou[1].gif 398 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\logo_sm[1].gif 4.60KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\nav_next[1].gif 1.48KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\seek[1].css 17.90KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\lpJs[1].js 2.08KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\btn_find_facts[1].gif 7.14KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\btn_signup[1].gif 1.51KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\survey[1].js 598 bytes
.94KB
 

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\RiderReportCINDY[1].swf 0.11MB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\btn_link_to_ticket-over[1].gif 6.52KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\img_facts_bkgnd[1].jpg 39.20KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\top_nav_wide[1].gif 11.50KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\foot_backissues[1].gif 1.88KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\foot_link[1].gif 1.90KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\index[1].cfm 13.68KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\whattya_think_03[1].gif 3.05KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\LQGTTDMN\index[2].cfm 14.84KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\desktop.ini 67 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\FairEnough[1].mp3 0.39MB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\msnsmall[1].png 769 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\MM-logo-16x16-xp[1].gif 1005 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\menuimage[1].gif 578 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\hpcl1012[1].css 1.06KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\IE1015[1].css 807 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\msft94[1].gif 893 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\1px-nav[1].gif 51 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\666[1].gif 43 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\srch-arrw[1].gif 73 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\0000000001_000000000000000017246[1].gif 85 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\results[1].aspx 3.69KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\logomsn[1].gif 1.69KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\more[1].gif 216 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\snbtnbk[1].gif 146 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\nav_current[1].gif 376 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\gds1[1].gif 2.57KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\windows[1].js 502 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\background[1].jpg 24.85KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\img_form_bkgd[1].gif 36.24KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\btn_backissues[1].gif 1.99KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\btn_contact[1].gif 1.46KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\submit_over[1].gif 2.80KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\btn_fair_enough-over[1].gif 23.37KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\btn_rider_report_over[1].gif 22.75KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\btn_view[1].gif 783 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\foot_signup[1].gif 1.46KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\btn_view-over[1].gif 866 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\index[1].cfm 21.41KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\whattya_think_11[1].jpg 839 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Internet Files\Content.IE5\BW5B4P8Q\index[2].cfm 14.84KB
C:\DOCUME~1\default\LOCALS~1\Temp\Cookies\index.dat 32.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\Cookies\[email protected][1].txt 124 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Cookies\[email protected][2].txt 290 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Cookies\[email protected][2].txt 238 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Cookies\[email protected][1].txt 130 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Cookies\[email protected][2].txt 158 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\History\History.IE5\index.dat 32.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\History\History.IE5\desktop.ini 113 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\956 99 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\WER187.tmp 0 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\280 116 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDr91.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDr75.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDr97.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T131.tmp 224 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\index.dat 2.96KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T134.tmp 3.16KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T135.tmp 1.21KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T136.tmp 42.12KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T137.tmp 24.54KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T138.tmp 32.48KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T139.tmp 24.04KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T13A.tmp 21.83KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T13B.tmp 17.34KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T13C.tmp 22.91KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T13D.tmp 27.58KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T13E.tmp 25.75KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T13F.tmp 22.94KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T140.tmp 28.32KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T141.tmp 45.89KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T142.tmp 25.54KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T143.tmp 35.34KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T144.tmp 24.36KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T145.tmp 107 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T146.tmp 17.57KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T147.tmp 28.66KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T148.tmp 43.89KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T149.tmp 26.39KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T14A.tmp 34.75KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T14B.tmp 21.45KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T14C.tmp 21.81KB
C:\DOCUME~1\default\LOCALS~1\Temp\Osss\T14D.tmp 11.11KB
C:\DOCUME~1\default\LOCALS~1\Temp\NDr9A.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDr9F.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDrA5.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDrAC.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDrFD.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\WcesView.log 4.43KB
C:\DOCUME~1\default\LOCALS~1\Temp\NDr11F.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\WER188.tmp 0 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\881 115 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\423 132 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDr79.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\wcesmgr.log 4.97KB
C:\DOCUME~1\default\LOCALS~1\Temp\wcesetup.log 6.77KB
C:\DOCUME~1\default\LOCALS~1\Temp\WCESCOMM.LOG 4.16KB
C:\DOCUME~1\default\LOCALS~1\Temp\NDrE8.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\nsh_104.exe 92.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\NDrF4.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\NDr122.tmp.html 196 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Directory 1 for hijackthis[1].zip\hijackthis.log 5.38KB
C:\DOCUME~1\default\LOCALS~1\Temp\InstHelp.dll 56.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\Temporary Directory 2 for hijackthis[1].zip\hijackthis.log 6.05KB
C:\DOCUME~1\default\LOCALS~1\Temp\WER187.tmp.dir00\appcompat.txt 3.40KB
C:\DOCUME~1\default\LOCALS~1\Temp\b.com 65.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\AxMetaStream_0302021C.dll 0.24MB
C:\DOCUME~1\default\LOCALS~1\Temp\AOLUserShell.dll 0.39MB
C:\DOCUME~1\default\LOCALS~1\Temp\SWFView.dll 0.61MB
C:\DOCUME~1\default\LOCALS~1\Temp\setup_wm.exe 0.21MB
C:\DOCUME~1\default\LOCALS~1\Temp\control.xml 717 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\msnmusax.ocx 0.45MB
C:\DOCUME~1\default\LOCALS~1\Temp\MsnMusic.exe 0.52MB
C:\DOCUME~1\default\LOCALS~1\Temp\MsnWmpPl.dll 74.70KB
C:\DOCUME~1\default\LOCALS~1\Temp\unicows.dll 0.23MB
C:\DOCUME~1\default\LOCALS~1\Temp\msninst.inf 2.31KB
C:\DOCUME~1\default\LOCALS~1\Temp\wrapperouter.exe 0.13MB
C:\DOCUME~1\default\LOCALS~1\Temp\~DF4F1A.tmp 16.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\~DF57AC.tmp 16.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\jrelog.txt 31.57KB
C:\DOCUME~1\default\LOCALS~1\Temp\java_install_reg.log 319 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\java_install.log 23.05KB
C:\DOCUME~1\default\LOCALS~1\Temp\~DFE2D0.tmp 0.17MB
C:\DOCUME~1\default\LOCALS~1\Temp\~DF42EE.tmp 0.17MB
C:\DOCUME~1\default\LOCALS~1\Temp\~DF6F6A.tmp 32.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\~DF7A56.tmp 0.17MB
C:\DOCUME~1\default\LOCALS~1\Temp\jusched.log 4.57KB
C:\DOCUME~1\default\LOCALS~1\Temp\jre-1_5_0_02-windows-i586-p-iftw_73945943.exe 0 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\~DF8D3D.tmp 0.17MB
C:\DOCUME~1\default\LOCALS~1\Temp\~DFCE2C.tmp 32.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\~DFDBC7.tmp 0.17MB
C:\DOCUME~1\default\LOCALS~1\Temp\573 99 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\482 117 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\268 100 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\343 111 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\DFC5A2B2.TMP 85 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\902 121 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\391 129 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\~DFCBDA.tmp 48.00KB
C:\DOCUME~1\default\LOCALS~1\Temp\JETE9E9.tmp 0 bytes
C:\DOCUME~1\default\LOCALS~1\Temp\~DFFB9C.tmp 48.00KB
C:\WINDOWS\MiniDump\Mini062805-01.dmp 64.00KB
C:\WINDOWS\MiniDump\Mini062905-01.dmp 64.00KB
C:\WINDOWS\MiniDump\Mini063005-01.dmp 64.00KB
C:\WINDOWS\MiniDump\Mini063005-02.dmp 64.00KB
C:\WINDOWS\MiniDump\Mini063005-03.dmp 64.00KB
C:\WINDOWS\MiniDump\Mini063005-04.dmp 64.00KB
C:\WINDOWS\system32\wbem\Logs\wbemcore.log 3.42KB
C:\WINDOWS\system32\wbem\Logs\mofcomp.log 8.97KB
C:\WINDOWS\system32\wbem\Logs\WinMgmt.log 1.39KB
C:\WINDOWS\system32\wbem\Logs\FrameWork.log 782 bytes
C:\WINDOWS\system32\wbem\Logs\setup.log 4.65KB
C:\WINDOWS\system32\wbem\Logs\wmiprov.log 16.70KB
C:\WINDOWS\system32\wbem\Logs\wmiadap.log 97 bytes
C:\WINDOWS\system32\wbem\Logs\wbemess.log 35.45KB
C:\WINDOWS\system32\wbem\Logs\wbemess.lo_ 64.07KB
C:\WINDOWS\Directx.log 57.55KB
C:\WINDOWS\setupapi.log 0.64MB
C:\WINDOWS\WINNT32.LOG 0.38MB
C:\WINDOWS\setupact.log 0.20MB
C:\WINDOWS\setuperr.log 81 bytes
C:\WINDOWS\PCTEL Platinum V.90 Modem.log 1.56KB
C:\WINDOWS\wsdu.log 148 bytes
C:\WINDOWS\FaxSetup.log 25.61KB
C:\WINDOWS\mqw9xmig.log 329 bytes
C:\WINDOWS\commigrate.log 403 bytes
C:\WINDOWS\regopt.log 1.50KB
C:\WINDOWS\ocgen.log 18.11KB
C:\WINDOWS\iis6.log 1.67KB
C:\WINDOWS\comsetup.log 17.36KB
C:\WINDOWS\ntdtcsetup.log 8.76KB
C:\WINDOWS\tsoc.log 10.51KB
C:\WINDOWS\msgsocm.log 1.16KB
C:\WINDOWS\ocmsn.log 1.56KB
C:\WINDOWS\Sti_Trace.log 0 bytes
C:\WINDOWS\wiaservc.log 49 bytes
C:\WINDOWS\wiadebug.log 498 bytes
C:\WINDOWS\sessmgr.setup.log 1.03KB
C:\WINDOWS\DtcInstall.log 128 bytes
C:\WINDOWS\Windows Update.log 280 bytes
C:\WINDOWS\wmsetup.log 2.62KB
C:\WINDOWS\0.log 0 bytes
C:\WINDOWS\wmsetup10.log 379 bytes
C:\WINDOWS\WindowsUpdate.log 0.75MB
C:\WINDOWS\KB842773.log 5.95KB
C:\WINDOWS\imsins.log 1.34KB
C:\WINDOWS\KB896428.log 3.19KB
C:\WINDOWS\KB890859.log 3.67KB
C:\WINDOWS\KB893086.log 3.37KB
C:\WINDOWS\KB888302.log 3.48KB
C:\WINDOWS\KB873333.log 3.58KB
C:\WINDOWS\KB893066.log 3.60KB
C:\WINDOWS\KB890046.log 3.68KB
C:\WINDOWS\KB891781.log 3.81KB
C:\WINDOWS\KB896358.log 3.84KB
C:\WINDOWS\KB896426.log 3.92KB
C:\WINDOWS\KB888113.log 3.97KB
C:\WINDOWS\KB873339.log 4.06KB
C:\WINDOWS\KB890175.log 4.14KB
C:\WINDOWS\KB885836.log 4.22KB
C:\WINDOWS\KB885835.log 4.69KB
C:\WINDOWS\KB896422.log 4.33KB
C:\WINDOWS\brndlog.bak 141 bytes
C:\WINDOWS\default.bak 688 bytes
C:\WINDOWS\WININIT.BAK 319 bytes
C:\WINDOWS\system.BAK 2.07KB
C:\WINDOWS\imsins.BAK 4.41KB
C:\WINDOWS\ntbtlog.txt 77.64KB
C:\WINDOWS\INSTLOG.TXT 713 bytes
C:\WINDOWS\NDISLOG.TXT 0 bytes
C:\WINDOWS\SchedLog.Txt 31.88KB
C:\WINDOWS\brndlog.txt 9.29KB
C:\WINDOWS\OEWABLog.txt 2.13KB
C:\WINDOWS\setuplog.txt 0.73MB
C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\drwtsn32.log 1.15MB
C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp 75.54KB
C:\WINDOWS\Debug\NetSetup.LOG 2.42KB
C:\WINDOWS\Debug\oakley.log 0 bytes
C:\WINDOWS\security\logs\scesetup.log 0.11MB
C:\WINDOWS\security\logs\SceRoot.log 206 bytes
C:\WINDOWS\security\logs\backup.log 3.67KB
C:\WINDOWS\security\logs\scecomp.old 2.07KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Update downloads.log 2.35KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050628-0018.log 243 bytes
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050628-0018.txt 1.00KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050628-0033.log 193 bytes
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050628-0034.txt 1011 bytes
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050712-0220.log 5.12KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050712-0232.txt 9.68KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050714-0245.log 2.00KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050714-0257.txt 3.65KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Fixes.050715-0154.txt 3.58KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050718-0957.log 424 bytes
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs\Checks.050718-1007.txt 1.17KB
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Statistics.ini 1.03KB
C:\Program Files\Lavasoft\Ad-Aware SE Personal\defs.ref.old 0.47MB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-06-27 22-40-50.txt 0.11MB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-06-27 23-26-58.txt 31.92KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-06-28 00-19-09.txt 23.07KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-06-28 00-33-57.txt 19.60KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-06-28 23-03-25.txt 16.13KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-07-04 09-22-18.txt 34.14KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-07-11 01-56-15.txt 22.15KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-07-12 02-27-33.txt 97.93KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-07-14 02-53-37.txt 23.98KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-07-17 13-30-48.txt 28.84KB
C:\Documents and Settings\default\Application Data\Lavasoft\Ad-Aware\Logs\Ad-Aware log2005-07-18 09-55-20.txt 36
 

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
Incident Status Location

Adware:Adware/ConsumerAlertSystemNo disinfected C:\Program Files\Cas\Client\casmf.dll
Adware:Adware/ConsumerAlertSystemNo disinfected C:\Program Files\Cas\Client\casclient.exe
Adware:adware/look2me No disinfected C:\WINDOWS\SYSTEM32\guard.tmp
Adware:adware/consumeralertsystemNo disinfected C:\PROGRAM FILES\CasStub
Adware:adware/savenow No disinfected HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\MAGNET
Adware:adware/purityscan No disinfected HKEY_LOCAL_MACHINE\SOFTWARE\CLICKSPRING
Adware:adware/cws.aboutblank No disinfected HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\PROTOCOLS\FILTER\TEXT/HTML\CLSID
Adware:adware/brilliantdigitalNo disinfected HKEY_CLASSES_ROOT\Interface\{48E59292-9880-11CF-9754-00AA00C00908}
Adware:Adware/PurityScan No disinfected C:\WINDOWS\SYSTEM32\Shex.exe
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\iyseng.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\iqsetup.dll
Adware:Adware/PurityScan No disinfected C:\WINDOWS\SYSTEM32\F?nts\nslookup.exe
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\guard.tmp
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\OLD168.tmp
 

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
Logfile of HijackThis v1.99.1
Scan saved at 11:05:17 AM, on 7/18/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
C:\Program Files\TizzleTalk\TizzleTalk.exe
C:\WINDOWS\System32\devldr32.exe
C:\WINDOWS\System32\?ystem\scanregw.exe
C:\Program Files\Cas\Client\casclient.exe
C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE
C:\Program Files\ssus\erwr.exe
C:\Program Files\NETGEAR WG311v2 Adapter\wlancfg5.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\default\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://desktop.presario.net/scripts.../deskredir2.dll?s=consumericon&c=2C01&lc=0409
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://desktop.presario.net/scripts.../deskredir2.dll?s=consumericon&c=2C01&lc=0409
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
O2 - BHO: rxh - {19AD8203-1538-43a0-848B-D136782E09DE} - C:\Program Files\Fireworks Screensaver\rxh2.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TizzleTalk] C:\Program Files\TizzleTalk\TizzleTalk.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q
O4 - HKCU\..\Run: [Rpt] C:\WINDOWS\System32\?ystem\scanregw.exe
O4 - HKCU\..\Run: [CAS Client] "C:\Program Files\Cas\Client\casclient.exe"
O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE"
O4 - HKCU\..\Run: [Etwc] C:\Program Files\ssus\erwr.exe
O4 - Global Startup: NETGEAR WG311v2 Smart Configuration.lnk = C:\Program Files\NETGEAR WG311v2 Adapter\wlancfg5.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=36467&clcid=0x409
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O18 - Filter: text/html - {8293D547-38DD-4325-B35A-F1817EDFA5FC} - C:\Program Files\Cas\Client\casmf.dll
O20 - Winlogon Notify: Unimodem - C:\WINDOWS\system32\nvtrap.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
 

Cookiegal

Karen
Administrator
Malware Specialist Coordinator
Joined
Aug 27, 2003
Messages
120,254
Click here: http://www.atribune.org/downloads/l2mfix.exe to download L2mfix.

Save the file to your desktop and double click l2mfix.exe. Read and Accept the agreement. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!
 

[email protected]

Thread Starter
Joined
Mar 28, 2005
Messages
69
L2MFIX find log 1.03
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Unimodem]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\nvtrap.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{0F2CDC6A-A665-68F4-0A50-1530E0A9BB9C}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Scripting Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Merge Shell Folder"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Microsoft SearchBand"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"=""
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"=""
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{568804CA-CBD7-11d0-9816-00C04FD91972}"="Menu Shell Folder"
"{5b4dae26-b807-11d0-9815-00c04fd91972}"="Menu Band"
"{8278F931-2A3E-11d2-838F-00C04FD918D0}"="Tracking Shell Menu"
"{E13EF4E4-D2F2-11d0-9816-00C04FD91972}"="Menu Site"
"{ECD4FC4F-521C-11D0-B792-00A0C90312E1}"="Menu Desk Bar"
"{D82BE2B0-5764-11D0-A96E-00C04FD705A2}"="IShellFolderBand"
"{0E5CBF21-D15F-11d0-8301-00AA005B4383}"="&Links"
"{7487cd30-f71a-11d0-9ea7-00805f714772}"="Thumbnail Image"
"{8BEBB290-52D0-11D0-B7F4-00C04FD706EC}"="Thumbnails"
"{8DE56A0D-E58B-41FE-9F80-3563CDCB2C22}"="Default Image Extrator for Properties"
"{450D8FBA-AD25-11D0-98A8-0800361B1103}"="MyDocs Folder"
"{1A9BA3A0-143A-11CF-8350-444553540000}"="Shell Favorite Folder"
"{20D04FE0-3AEA-1069-A2D8-08002B30309D}"="My Computer"
"{86747AC0-42A0-1069-A2E6-08002B30309D}"="Briefcase Folder"
"{0AFACED1-E828-11D1-9187-B532F1E9575D}"="Folder Shortcut"
"{12518493-00B2-11d2-9FA5-9E3420524153}"="Mounted Volume"
"{21B22460-3AEA-1069-A2DC-08002B30309D}"="File Property Page Extension"
"{B091E540-83E3-11CF-A713-0020AFD79762}"="File Types Page"
"{FBF23B41-E3F0-101B-8488-00AA003E56F8}"="MIME File Types Hook"
"{C2FBB630-2971-11d1-A18C-00C04FD75D13}"="Microsoft CopyTo Service"
"{C2FBB631-2971-11d1-A18C-00C04FD75D13}"="Microsoft MoveTo Service"
"{13709620-C279-11CE-A49E-444553540000}"="Shell Automation Service"
"{62112AA1-EBE4-11cf-A5FB-0020AFE7292D}"="Shell Automation Folder View"
"{4622AD11-FF23-11d0-8D34-00A0C90F2719}"="Start Menu"
"{7BA4C740-9E81-11CF-99D3-00AA004AE837}"="Microsoft SendTo Service"
"{D969A300-E7FF-11d0-A93B-00A0C90F2719}"="Microsoft New Object Service"
"{09799AFB-AD67-11d1-ABCD-00C04FC30936}"="Open With Context Menu Handler"
"{3FC0B520-68A9-11D0-8D77-00C04FD70822}"="Display Control Panel HTML Extensions"
"{75048700-EF1F-11D0-9888-006097DEACF9}"="ActiveDesktop"
"{6D5313C0-8C62-11D1-B2CD-006097DF8C11}"="Folder Options Property Page Extension"
"{57651662-CE3E-11D0-8D77-00C04FC99D61}"="CmdFileIcon"
"{4657278A-411B-11d2-839A-00C04FD918D0}"="Shell Drag and Drop helper"
"{F0FE9377-391C-41BE-95CE-B25963D24C4B}"=""
"{640167b4-59b0-47a6-b335-a6b3c0695aea}"="Portable Media Devices"
"{cc86590a-b60a-48e6-996b-41d25ed39a1e}"="Portable Media Devices Menu"
"{472083B0-C522-11CF-8763-00608CC02F24}"="avast"

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{BD472F60-27FA-11cf-B8B4-444553540000}]
@="Compressed Folder Right Drag Handler"

[HKEY_CLASSES_ROOT\CLSID\{BD472F60-27FA-11cf-B8B4-444553540000}\InProcServer32]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,7a,00,69,00,\
70,00,66,00,6c,00,64,00,72,00,2e,00,64,00,6c,00,6c,00,00,00
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}]
@="Compressed Folder SendTo Target"
"FriendlyTypeName"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,\
00,6f,00,6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,\
32,00,5c,00,7a,00,69,00,70,00,66,00,6c,00,64,00,72,00,2e,00,64,00,6c,00,6c,\
00,2c,00,2d,00,31,00,30,00,32,00,32,00,36,00,00,00
"NeverShowExt"=""
"NoOpen"="Drag Files onto this icon to compress them."
"EditFlags"=dword:00000001

[HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}\DefaultIcon]
@="C:\\WINDOWS\\SYSTEM32\\ZIPFLDR.DLL"

[HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}\InProcServer32]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,7a,00,69,00,\
70,00,66,00,6c,00,64,00,72,00,2e,00,64,00,6c,00,6c,00,00,00
"ThreadingModel"="Apartment"

[HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}\ShellEx]

[HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}\ShellEx\DropHandler]
@="{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{F0FE9377-391C-41BE-95CE-B25963D24C4B}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{F0FE9377-391C-41BE-95CE-B25963D24C4B}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{F0FE9377-391C-41BE-95CE-B25963D24C4B}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{F0FE9377-391C-41BE-95CE-B25963D24C4B}\InprocServer32]
@="C:\\WINDOWS\\system32\\uyrcoina.dll"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:

C:\WINDOWS\SYSTEM32\
hashlib.dll Fri Jun 24 2005 3:24:22p A.... 117,976 115.21 K
gcunco~1.dll Fri Jun 24 2005 3:24:20p A.... 95,448 93.21 K
gccoll~1.dll Fri Jun 24 2005 3:24:22p A.... 126,680 123.71 K
unicows.dll Wed Apr 27 2005 11:22:36p A.... 245,408 239.66 K
wups.dll Thu May 26 2005 4:16:30a A.... 41,240 40.27 K
dpu11.dll Wed Apr 27 2005 11:22:36p A.... 245,760 240.00 K
dpugui11.dll Wed Apr 27 2005 11:22:36p A.... 581,632 568.00 K
dpus11.dll Wed Apr 27 2005 11:22:38p A.... 303,104 296.00 K
dpv11.dll Wed Apr 27 2005 11:22:38p A.... 57,344 56.00 K
qt-dx331.dll Wed Apr 27 2005 11:22:40p A.... 3,596,288 3.43 M
libeay32.dll Wed Apr 27 2005 11:22:36p A.... 831,488 812.00 K
ssleay32.dll Wed Apr 27 2005 11:22:36p A.... 159,744 156.00 K
dpl100.dll Wed Apr 27 2005 11:22:36p A.... 86,016 84.00 K
dtu100.dll Wed May 18 2005 4:40:22p A.... 200,704 196.00 K
divx.dll Thu Jun 9 2005 3:32:28p A.... 692,736 676.50 K
divx_x~1.dll Wed May 4 2005 8:12:48p A.... 688,128 672.00 K
divx_x~2.dll Wed May 4 2005 8:12:48p A.... 688,128 672.00 K
divx_x~3.dll Wed May 4 2005 8:12:50p A.... 671,744 656.00 K
cdm.dll Thu May 26 2005 4:16:24a A.... 75,544 73.77 K
iuengine.dll Thu May 26 2005 4:16:24a A.... 198,424 193.77 K
wuapi.dll Thu May 26 2005 4:16:30a A.... 465,176 454.27 K
wuaueng.dll Thu May 26 2005 4:16:30a A.... 1,343,768 1.28 M
wuaueng1.dll Thu May 26 2005 4:16:30a A.... 194,328 189.77 K
wucltui.dll Thu May 26 2005 4:16:30a A.... 127,256 124.27 K
wups2.dll Thu May 26 2005 4:16:30a A.... 18,200 17.77 K
wuweb.dll Thu May 26 2005 4:16:30a A.... 173,536 169.47 K
iyseng.dll Mon Jul 11 2005 10:49:36a ..S.R 417,792 408.00 K
iqsetup.dll Mon Jul 11 2005 10:49:42a ..S.R 417,792 408.00 K
nvtrap.dll Mon Jul 18 2005 9:04:06a ..S.R 417,792 408.00 K
uyrcoina.dll Mon Jul 18 2005 10:53:08a ..S.R 417,792 408.00 K

30 items found: 30 files (4 H/S), 0 directories.
Total of file sizes: 13,696,968 bytes 13.06 M
Locate .tmp files:

C:\WINDOWS\SYSTEM32\
guard.tmp Wed Jul 13 2005 8:51:12p ..S.R 417,792 408.00 K
old168.tmp Thu Jul 14 2005 2:52:24p A.S.R 417,792 408.00 K

2 items found: 2 files (2 H/S), 0 directories.
Total of file sizes: 835,584 bytes 816.00 K
**********************************************************************************
Directory Listing of system files:
Volume in drive C has no label.
Volume Serial Number is 2356-11E6

Directory of C:\WINDOWS\System32

07/18/2005 10:53 AM 417,792 uyrcoina.dll
07/18/2005 09:04 AM 417,792 nvtrap.dll
07/14/2005 02:52 PM 417,792 OLD168.tmp
07/13/2005 08:51 PM 417,792 guard.tmp
07/11/2005 10:49 AM 417,792 iqsetup.dll
07/11/2005 10:49 AM 417,792 iyseng.dll
06/27/2005 10:07 PM <DIR> Microsoft
06/27/2005 09:40 PM <DIR> dllcache
6 File(s) 2,506,752 bytes
2 Dir(s) 28,559,704,064 bytes free
 

Cookiegal

Karen
Administrator
Malware Specialist Coordinator
Joined
Aug 27, 2003
Messages
120,254
Close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder until you are asked to do so!
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top