Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: "An Installer Wants to Run" when I press remove  (Read 14236 times)

0 Members and 1 Guest are viewing this topic.

undredseesee

    Topic Starter


    Rookie

    "An Installer Wants to Run" when I press remove
    « on: July 24, 2010, 02:38:05 PM »
    Hi, I'm trying (nervously!) to follow EvilFantasy's instructions on malware removal.  I've got Avast and Online Armor installed.  I'm trying to get rid of unwanted/unknown programs from the Add/Remove section, but when I press remove on several of them, a box comes up with "going to install", and an Online Armor box over it saying "an installer wants to run..", it gives a program name, parent program and says it's not flagged as good or bad.  The program name/parent program name bear no resemblance to the name of the programs I'm trying to remove.  Should these be removed before going further with the clean-up, and if so how, please?

    SuperDave

    • Malware Removal Specialist
    • Moderator


    • Genius
    • Thanked: 1020
    • Certifications: List
    • Experience: Expert
    • OS: Windows 10
    Re: "An Installer Wants to Run" when I press remove
    « Reply #1 on: July 24, 2010, 04:54:07 PM »
    Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer. I am working under the guidance of one of the specialist of this forum so it may take a bit longer to process your logs.

    1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
    2. The fixes are specific to your problem and should only be used for this issue on this machine.
    3. If you don't know or understand something, please don't hesitate to ask.
    4. Please DO NOT run any other tools or scans while I am helping you.
    5. It is important that you reply to this thread. Do not start a new topic.
    6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
    7. Absence of symptoms does not mean that everything is clear.

    Quote
    but when I press remove on several of them, a box comes up with "going to install", and an Online Armor box over it saying "an installer wants to run..", it gives a program name, parent program and says it's not flagged as good or bad.
    Let's just ignore this and run the scans below.They will give me a better idea about what's happening with your computer. What makes you think that your computer is infected? What are the symptoms that you're experiencing?

    SUPERAntiSpyware

    If you already have SUPERAntiSpyware be sure to check for updates before scanning!


    Download SuperAntispyware Free Edition (SAS)
    * Double-click the icon on your desktop to run the installer.
    * When asked to Update the program definitions, click Yes
    * If you encounter any problems while downloading the updates, manually download and unzip them from here
    * Next click the Preferences button.

    •Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
    * Click the Scanning Control tab.
    * Under Scanner Options make sure only the following are checked:

    •Close browsers before scanning
    •Scan for tracking cookies
    •Terminate memory threats before quarantining
    Please leave the others unchecked

    •Click the Close button to leave the control center screen.

    * On the main screen click Scan your computer
    * On the left check the box for the drive you are scanning.
    * On the right choose Perform Complete Scan
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete a summary box will appear. Click OK
    * Make sure everything in the white box has a check next to it, then click Next
    * It will quarantine what it found and if it asks if you want to reboot, click Yes

    •To retrieve the removal information please do the following:
    •After reboot, double-click the SUPERAntiSpyware icon on your desktop.
    •Click Preferences. Click the Statistics/Logs tab.

    •Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

    •It will open in your default text editor (preferably Notepad).
    •Save the notepad file to your desktop by clicking (in notepad) File > Save As...

    * Save the log somewhere you can easily find it. (normally the desktop)
    * Click close and close again to exit the program.
    *Copy and Paste the log in your post.

    ================================

    Please download Malwarebytes Anti-Malware from here.

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Full Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
    • Please save the log to a location you will remember.
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy and paste the entire report in your next reply.
    Extra Note:

    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

    ================================

    Please download: HiJackThis to your Desktop.
    • Double Click the HijackThis icon, located on your Desktop.
    • By Default, it will install to: C:\Program Files\Trend Micro\HijackThis
    • Accept the license agreement.
    • Click the Open the Misc Tools section button.
    • Place a checkmark beside Calculate MD5 of files if possible. Then, click Back.
    • Click Do a System Scan and Save a Logfile. Or, if you see a white screen, click Scan.
    • Please post the log in your next reply.
    ===============================

    Download Security Check by screen317 from one of the following links and save it to your desktop.

    Link 1
    Link 2

    * Unzip SecurityCheck.zip and a folder named Security Check should appear.
    * Open the Security Check folder and double-click Security Check.bat
    * Follow the on-screen instructions inside of the black box.
    * A Notepad document should open automatically called checkup.txt
    * Post the contents of that document in your next reply.

    Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.
    Windows 8 and Windows 10 dual boot with two SSD's

    undredseesee

      Topic Starter


      Rookie

      Re: "An Installer Wants to Run" when I press remove
      « Reply #2 on: July 25, 2010, 05:39:29 AM »
      Hi Dave, thanks VERY much for help.  Original symptoms were problems with e-mail links/attachments, getting slow, I posted on your XP site, Allan recommended transferring to this forum.
      I've downloaded SAS (it found 1261 threats, mostly Adware) but when I get to the point, Save the Notepad file to desktop by clicking (in Notepad) File > Save As, it says a file already exists, and gives me an option to replace it.  There's going to be no option to click close & close again is there? 
      When you say Copy & Paste the log in your post, do you mean copy that file into a post to you (like this?).  Sorry to sound such an idiot - but when it comes to computers - I AM!

      SuperDave

      • Malware Removal Specialist
      • Moderator


      • Genius
      • Thanked: 1020
      • Certifications: List
      • Experience: Expert
      • OS: Windows 10
      Re: "An Installer Wants to Run" when I press remove
      « Reply #3 on: July 26, 2010, 01:22:17 PM »
      Just forget about the SAS log. When you run the other scans they will open a .txt file in Notepad. Just copy everything in Notepad and paste it into your reply. If the log is particularly long, you may have to make two posts.
      Windows 8 and Windows 10 dual boot with two SSD's

      undredseesee

        Topic Starter


        Rookie

        Re: "An Installer Wants to Run" when I press remove
        « Reply #4 on: July 27, 2010, 07:37:25 AM »
        Thanks, SuperDave.  I've worked thru' successfully I think, and used a bit of logic to find SAS. Results (more than 1 reply):
        SUPERAntiSpyware Scan Log
        http://www.superantispyware.com

        Generated 07/25/2010 at 12:09 PM

        Application Version : 4.41.1000

        Core Rules Database Version : 5264
        Trace Rules Database Version: 3076

        Scan type       : Complete Scan
        Total Scan Time : 01:03:33

        Memory items scanned      : 575
        Memory threats detected   : 0
        Registry items scanned    : 5417
        Registry threats detected : 105
        File items scanned        : 73889
        File threats detected     : 1161

        Adware.HBHelper
           HKLM\Software\Classes\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\Implemented Categories
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\InprocServer32
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\InprocServer32#ThreadingModel
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\ProgID
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\Programmable
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\TypeLib
           HKCR\CLSID\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}\VersionIndependentProgID
           HKCR\TBSB07183.TBSB07183.3
           HKCR\TBSB07183.TBSB07183.3\CLSID
           HKCR\TBSB07183.TBSB07183
           HKCR\TBSB07183.TBSB07183\CLSID
           HKCR\TBSB07183.TBSB07183\CurVer
           HKCR\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}
           HKCR\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0
           HKCR\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\0
           HKCR\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\0\win32
           HKCR\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\FLAGS
           HKCR\TypeLib\{77AA25E8-6083-4949-A831-9CB11861DC10}\1.0\HELPDIR
           C:\PROGRAM FILES\FAST BROWSER SEARCH\IE\FBSTOOLBAR.DLL
           HKLM\Software\Classes\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}#AppID
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}\InprocServer32
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}\InprocServer32#ThreadingModel
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}\ProgID
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}\Programmable
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}\TypeLib
           HKCR\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}\VersionIndependentProgID
           HKCR\ComObject.DeskbarEnabler.1
           HKCR\ComObject.DeskbarEnabler.1\CLSID
           HKCR\ComObject.DeskbarEnabler
           HKCR\ComObject.DeskbarEnabler\CLSID
           HKCR\ComObject.DeskbarEnabler\CurVer
           HKCR\TypeLib\{62D8AD65-9DE8-4A50-A025-576C6D411881}
           HKLM\Software\Classes\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32#ThreadingModel
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\ProgID
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\TypeLib
           HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\VersionIndependentProgID
           HKCR\URLSearchHook.ToolbarURLSearchHook.1
           HKCR\URLSearchHook.ToolbarURLSearchHook.1\CLSID
           HKCR\URLSearchHook.ToolbarURLSearchHook
           HKCR\URLSearchHook.ToolbarURLSearchHook\CLSID
           HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
           HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0
           HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0
           HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0\win32
           HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\FLAGS
           HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\HELPDIR
           C:\PROGRAM FILES\FAST BROWSER SEARCH\IE\TBHELPER.DLL
           HKLM\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\InprocServer32
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\InprocServer32#ThreadingModel
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\ProgID
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\Programmable
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\TypeLib
           HKCR\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\VersionIndependentProgID
           HKCR\Toolbar3.XBTBPos00.1
           HKCR\Toolbar3.XBTBPos00.1\CLSID
           HKCR\Toolbar3.XBTBPos00
           HKCR\Toolbar3.XBTBPos00\CLSID
           HKCR\Toolbar3.XBTBPos00\CurVer
           HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
           HKU\S-1-5-21-1202660629-261903793-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1BB22D38-A411-4B13-A746-C2A4F4EC7344}
           HKU\S-1-5-21-1202660629-261903793-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
           HKU\S-1-5-21-1202660629-261903793-725345543-1003\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{1BB22D38-A411-4B13-A746-C2A4F4EC7344}
           HKCR\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}
           HKCR\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}\ProxyStubClsid
           HKCR\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}\ProxyStubClsid32
           HKCR\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}\TypeLib
           HKCR\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}\TypeLib#Version

        Adware.Tracking Cookie
           C:\Documents and Settings\Owner\Cookies\owner@therevcounter[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@chitika[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\owner@advertising[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@imrworldwide[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@questionmarket[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\owner@estat[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@tacoda[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@english-country-garden[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@statcounter[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\owner@apmebf[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@commission-junction[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@qnsr[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@traveladvertising[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@singletrackworld[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@essexcourt[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@interclick[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@revsci[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@adviva[3].txt
           C:\Documents and Settings\Owner\Cookies\owner@atdmt[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@collective-media[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adrevolver[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@trafficmp[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@mediaplex[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@mediaplex[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@gostats[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@tradedoubler[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@doubleclick[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@specificclick[3].txt
           C:\Documents and Settings\Owner\Cookies\owner@serving-sys[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@findarticles[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@realmedia[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@clickshift[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@bluestreak[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@clickbank[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@zedo[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@yadro[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][4].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@fastclick[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][4].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][6].txt
           C:\Documents and Settings\Owner\Cookies\owner@smileycentral[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@hitbox[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@burstnet[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@megastats[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@casalemedia[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@vetclick[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@invitemedia[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@pro-market[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@tripod[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@mooseyscountrygarden[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@azjmp[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@kanoodle[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@virginmedia[3].txt
           C:\Documents and Settings\Owner\Cookies\owner@burstbeacon[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@findaproperty[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@clicksor[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@dmtracker[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@virginmedia[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@xiti[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@insightexpressai[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@propertyfinder[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@weborama[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@sexypantiesandnaughtyknickers[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@adtrackz[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@roiservice[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@easy-web-stats[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][4].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@shinystat[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][5].txt
           C:\Documents and Settings\Owner\Cookies\owner@2o7[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@bravenet[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@bizrate[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@superstats[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@247realmedia[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@petbusinessexperts[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][4].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@1freeadvertising[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@trafficgeyser[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@lifetracks[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@pointroll[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@toplist[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@nextag[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@hosexpress[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@findtheneedle[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@dealtime[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@findyourdestiny[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@keywordelite[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@bannerreviews[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@valueclick[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@webstat[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@specificmedia[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@findaffiliateoffers[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@mlmleadsystemmentor[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@trafficregenerator[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@mywebsearch[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@clicktorrent[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@ufindus[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@gotquestions[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][7].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@accesstoinsight[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][5].txt
           C:\Documents and Settings\Owner\Cookies\owner@rambler[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\owner@hotlog[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@adwarepatrol[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@adtech[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@77tracking[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@nswroadandtrackbikes[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@123count[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@zanox[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@media6degrees[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@countercentral[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@mens-*censored*-health[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][4].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@clickbank[3].txt
           C:\Documents and Settings\Owner\Cookies\owner@eyewonder[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@trafficholder[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adknowledge[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][5].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adcentriconline[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][6].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@specificclick[4].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adtech[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@linksynergy[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@revsci[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@banneradblueprint[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@myroitracking[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@advertiseireland[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@clickaider[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@kontera[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][8].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\owner@liveperson[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@trackalyzer[3].txt
           C:\Documents and Settings\Owner\Cookies\owner@adbrite[3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@overture[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@liveperson[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][9].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@audience2media[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@cj[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@chokertraffic[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@w3counter[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adxpose[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected][10].txt
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\[email protected]
           C:\Documents and Settings\Owner\Cookies\owner@popularscreensavers[2].txt
           2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           ads1.msn.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           atdmt.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           b.ads1.msn.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           bluestreak.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           broadcast.piximedia.fr [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           cdn.insights.gravity.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           cdn4.specificclick.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           cdn5.specificclick.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           content.oddcast.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           core.insightexpressai.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           ds.serving-sys.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           ec.atdmt.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           euroclick.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           files.adbrite.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           ia.media-imdb.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           img-cdn.mediaplex.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           interclick.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           m.uk.2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           m1.2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           m1.emea.2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           macromedia.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           media.mtvnservices.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           media.scanscout.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           media.winamp.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           media1.break.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           msntest.serving-sys.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           objects.tremormedia.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           oddcast.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           richmedia247.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           s0.2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           secure-uk.imrworldwide.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           secure-us.imrworldwide.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           serving-sys.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           spe.atdmt.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           static.2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           track.webgains.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           uk.2mdn.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           weborama.fr [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           www.banneradblueprint.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           www.lifetracks.com [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           yieldmanager.edgesuite.net [ C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\#SharedObjects\GVJVDN9L ]
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@77tracking[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@adbrite[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@adcentriconline[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adsense-secrets[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@adviva[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@bdsmsingles[2].txt
           C:\Documents and Settings\Owner\Cookies\owner@bidandclick[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@boardtracker[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@burstbeacon[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@chitika[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\owner@click2pay[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@click2pay[2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][3].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@dmtracker[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt
           C:\Documents and Settings\Owner\Cookies\owner@dvd-and-media[1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
           C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
           C:\Documents and Settings\Owner\Cookies\owner@e-2dj6wc

        undredseesee

          Topic Starter


          Rookie

          Re: "An Installer Wants to Run" when I press remove
          « Reply #5 on: July 27, 2010, 07:50:30 AM »
          Hi, here's the mbam log...
          Malwarebytes' Anti-Malware 1.46
          www.malwarebytes.org

          Database version: 4356

          Windows 5.1.2600 Service Pack 3
          Internet Explorer 8.0.6001.18702

          27/07/2010 11:43:18
          mbam-log-2010-07-27 (11-43-18).txt

          Scan type: Full scan (C:\|D:\|)
          Objects scanned: 199577
          Time elapsed: 1 hour(s), 1 minute(s), 7 second(s)

          Memory Processes Infected: 0
          Memory Modules Infected: 0
          Registry Keys Infected: 1
          Registry Values Infected: 0
          Registry Data Items Infected: 0
          Folders Infected: 0
          Files Infected: 0

          Memory Processes Infected:
          (No malicious items detected)

          Memory Modules Infected:
          (No malicious items detected)

          Registry Keys Infected:
          HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\@mywebsearch.com/Plugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.

          Registry Values Infected:
          (No malicious items detected)

          Registry Data Items Infected:
          (No malicious items detected)

          Folders Infected:
          (No malicious items detected)

          Files Infected:
          (No malicious items detected)


          undredseesee

            Topic Starter


            Rookie

            Re: "An Installer Wants to Run" when I press remove
            « Reply #6 on: July 27, 2010, 07:53:34 AM »
            Hi, the HiJackThis log is:
            Logfile of Trend Micro HijackThis v2.0.2
            Scan saved at 12:40:34, on 27/07/2010
            Platform: Windows XP SP3 (WinNT 5.01.2600)
            MSIE: Internet Explorer v8.00 (8.00.6001.18702)
            Boot mode: Normal

            Running processes:
            C:\WINDOWS\System32\smss.exe
            C:\WINDOWS\system32\winlogon.exe
            C:\WINDOWS\system32\services.exe
            C:\WINDOWS\system32\lsass.exe
            C:\WINDOWS\system32\Ati2evxx.exe
            C:\WINDOWS\system32\svchost.exe
            C:\WINDOWS\System32\svchost.exe
            C:\Program Files\Emsisoft\Online Armor\OAcat.exe
            C:\WINDOWS\system32\Ati2evxx.exe
            C:\Program Files\Emsisoft\Online Armor\oasrv.exe
            C:\WINDOWS\Explorer.EXE
            C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
            C:\WINDOWS\system32\spoolsv.exe
            C:\WINDOWS\system32\svchost.exe
            C:\WINDOWS\SOUNDMAN.EXE
            C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
            C:\Program Files\QuickTime\qttask.exe
            C:\Program Files\Thomson\SpeedTouch USB\Dragdiag.exe
            C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
            C:\Program Files\Common Files\Real\Update_OB\realsched.exe
            C:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe
            C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe
            C:\Program Files\Emsisoft\Online Armor\oaui.exe
            C:\WINDOWS\system32\ctfmon.exe
            C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIFBE.EXE
            C:\Program Files\McAfee Security Scan\1.0.150\SSScheduler.exe
            C:\Program Files\Emsisoft\Online Armor\OAhlp.exe
            C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
            C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
            C:\Program Files\Internet Explorer\iexplore.exe
            C:\Program Files\Internet Explorer\iexplore.exe
            C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

            R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
            R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
            R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
            O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (filesize 59032 bytes, MD5 4EA3A6CD9D20584FFAFDB1E47DBF0E20)
            O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll (filesize 329312 bytes, MD5 98EA10E878D73C261E0C6316A3A48658)
            O2 - BHO: Easy Photo Print - {9421DD08-935F-4701-A9CA-22DF90AC4EA6} - C:\Program Files\Epson Software\Easy Photo Print\EPTBL.dll (filesize 266240 bytes, MD5 EA3329E06D7C794B788CEADA90AB7000)
            O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (filesize 278192 bytes, MD5 389947CAD1A9C504DF6285AA1E7BE6F1)
            O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.5126.1836\swg.dll (filesize 814648 bytes, MD5 42CB4EE0B0FC259C8AD20B460FA7D72A)
            O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll (filesize 368640 bytes, MD5 01319CF4030B3740BA8261E7024ACAD1)
            O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll (filesize 368640 bytes, MD5 01319CF4030B3740BA8261E7024ACAD1)
            O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll (filesize 343112 bytes, MD5 5E2F2DB01F934243B74440F534880D19)
            O3 - Toolbar: Easy Photo Print - {9421DD08-935F-4701-A9CA-22DF90AC4EA6} - C:\Program Files\Epson Software\Easy Photo Print\EPTBL.dll (filesize 266240 bytes, MD5 EA3329E06D7C794B788CEADA90AB7000)
            O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (filesize 278192 bytes, MD5 389947CAD1A9C504DF6285AA1E7BE6F1)
            O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE (filesize 77824 bytes, MD5 D5D0CD6A04617A15C2DF76CD668FF540)
            O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime (filesize 61440 bytes, MD5 0FA537E4E4729B97676CE68893E72DAE)
            O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exeC:\WINDOWS\system32\NeroCheck.exe
            O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime (filesize 98304 bytes, MD5 C341CCFBE98BC7DF6E0B856BB9FC265A)
            O4 - HKLM\..\Run: [WorksFUD] C:\Program Files\Microsoft Works\wkfud.exeC:\Program Files\Microsoft Works\wkfud.exe
            O4 - HKLM\..\Run: [Microsoft Works Portfolio] C:\Program Files\Microsoft Works\WksSb.exe /AllUsers (filesize 311350 bytes, MD5 98CB1B841FD1B0E12897352F18DDDAE1)
            O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Microsoft Works\WkDetect.exeC:\Program Files\Microsoft Works\WkDetect.exe
            O4 - HKLM\..\Run: [SpeedTouch USB Diagnostics] "C:\Program Files\Thomson\SpeedTouch USB\Dragdiag.exe" /icon (filesize 866816 bytes, MD5 D40191AA225638AB20E59524CDD74030)
            O4 - HKLM\..\Run: [EPSON Stylus C48 Series (Copy 1)] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I091.EXE /P32 "EPSON Stylus C48 Series (Copy 1)" /O6 "USB001" /M "Stylus C48" (filesize 99840 bytes, MD5 FE9197AD88D3899A7B672AB7DEA2AF88)
            O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe" (filesize 57344 bytes, MD5 617FA5BE646B5E8D6670FD4710ACD2D3)
            O4 - HKLM\..\Run: [FBSearch] C:\Program Files\Search Guard Plus\SearchGuardPlus.exeC:\Program Files\Search Guard Plus\SearchGuardPlus.exe
            O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot (filesize 198160 bytes, MD5 4C784423B8F0DAE1392398356C9BE1FC)
            O4 - HKLM\..\Run: [EEventManager] C:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exeC:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe
            O4 - HKLM\..\Run: [avast5] C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe /nogui
            O4 - HKLM\..\Run: [@OnlineArmor GUI] "C:\Program Files\Emsisoft\Online Armor\oaui.exe" (filesize 6854984 bytes, MD5 83A94A797C3D23EF02AFA5F73B691D0C)
            O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
            O4 - HKCU\..\Run: [NoAdware4] "C:\Program Files\NoAdware4\NoAdware4.exe" :Min:
            O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exeC:\WINDOWS\system32\ctfmon.exe
            O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" (filesize 68856 bytes, MD5 E616A6A6E91B0A86F2F6217CDE835FFE)
            O4 - HKCU\..\Run: [EPSON SX110 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIFBE.EXE /FU "C:\WINDOWS\TEMP\E_S8A.tmp" /EF "HKCU" (filesize 199680 bytes, MD5 7AC2182FA963EFD2F72E8399BF0E67F9)
            O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
            O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
            O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
            O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
            O4 - Startup: BBC iPlayer Desktop.lnk = C:\Program Files\BBC iPlayer Desktop\BBC iPlayer Desktop.exe
            O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe (filesize 29696 bytes, MD5 DFCB9ADE94A4F8A7C42EEF41101A30AD)
            O4 - Global Startup: ATI CATALYST System Tray.lnk = C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe (filesize 61440 bytes, MD5 0FA537E4E4729B97676CE68893E72DAE)
            O4 - Global Startup: McAfee Security Scan.lnk = ?
            O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE (filesize 65588 bytes, MD5 0E2EBB670C1476F2964FF292F9E57203)
            O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = ?
            O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
            O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
            O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe (filesize 558080 bytes, MD5 AAC1D4EE39DF138C5D30AC5883E3B59F)
            O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe (filesize 558080 bytes, MD5 AAC1D4EE39DF138C5D30AC5883E3B59F)
            O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)
            O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)
            O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
            O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w3/pr01/resources/MSNPUpld.cab
            O16 - DPF: {6D2EF4B4-CB62-4C0B-85F3-B79C236D702C} (ContactExtractor Class) - http://www.facebook.com/controls/contactx.dll
            O16 - DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} (ScorchPlugin Class) - http://www.sibelius.com/download/software/win/ActiveXPlugin.cab
            O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} - http://wwwimages.adobe.com/www.adobe.com/products/acrobat/nos/gp.cab
            O16 - DPF: {D8089245-3211-40F6-819B-9E5E92CD61A2} (FlashXControl Object) - https://signin8.valueactive.com/Register/Branding/olr3313/OCX/v1018/flashax.cab
            O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
            O17 - HKLM\System\CCS\Services\Tcpip\..\{E2E93190-FF51-4025-97C6-3710BE4A8D1E}: NameServer = 212.139.132.42 212.139.132.41
            O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLLC:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
            O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exeC:\WINDOWS\system32\Ati2evxx.exe
            O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exeC:\WINDOWS\system32\ati2sgag.exe
            O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exeC:\Program Files\Alwil Software\Avast5\AvastSvc.exe
            O23 - Service: avast! Mail Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exeC:\Program Files\Alwil Software\Avast5\AvastSvc.exe
            O23 - Service: avast! Web Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exeC:\Program Files\Alwil Software\Avast5\AvastSvc.exe
            O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exeC:\Program Files\Google\Update\GoogleUpdate.exe
            O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exeC:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
            O23 - Service: Online Armor Helper Service (OAcat) - Emsi Software GmbH - C:\Program Files\Emsisoft\Online Armor\OAcat.exeC:\Program Files\Emsisoft\Online Armor\OAcat.exe
            O23 - Service: Online Armor (SvcOnlineArmor) - Emsi Software GmbH - C:\Program Files\Emsisoft\Online Armor\oasrv.exeC:\Program Files\Emsisoft\Online Armor\oasrv.exe

            --
            End of file - 11860 bytes

            undredseesee

              Topic Starter


              Rookie

              Re: "An Installer Wants to Run" when I press remove
              « Reply #7 on: July 27, 2010, 08:03:06 AM »
              Hi, last log, Checkup (n.b. this mentions McAfee Security Scan, don't know what it is or where it came from):

               Results of screen317's Security Check version 0.99.4 
               Windows XP Service Pack 3 
               Internet Explorer 8 
              ``````````````````````````````
              Antivirus/Firewall Check:

               Windows Firewall Disabled! 
               avast! Free Antivirus   
               Online Armor 4.0   
               McAfee Security Scan   
              ```````````````````````````````
              Anti-malware/Other Utilities Check:

               Malwarebytes' Anti-Malware   
               HijackThis 2.0.2   
               Adobe Flash Player 10.0.45.2 
              Adobe Reader 7.1.0
              Out of date Adobe Reader installed!
              ````````````````````````````````
              Process Check: 
              objlist.exe by Laurent

               Tall Emu Online Armor OAcat.exe
               Tall Emu Online Armor oasrv.exe
               Tall Emu Online Armor oaui.exe
               Tall Emu Online Armor OAhlp.exe
               Alwil Software Avast5 AvastSvc.exe 
               ALWILS~1 Avast5 avastUI.exe 
              ````````````````````````````````
              DNS Vulnerability Check:

               GREAT! (Not vulnerable to DNS cache poisoning)

              ``````````End of Log````````````

              SuperDave

              • Malware Removal Specialist
              • Moderator


              • Genius
              • Thanked: 1020
              • Certifications: List
              • Experience: Expert
              • OS: Windows 10
              Re: "An Installer Wants to Run" when I press remove
              « Reply #8 on: July 27, 2010, 04:13:42 PM »
              Please download the newest version of Adobe Acrobat Reader from Adobe.com

              Before installing: it is important to remove older versions of Acrobat Reader since it does not do so automatically and old versions still leave you vulnerable.
              Go to the Control Panel and enter Add or Remove Programs.
              Search in the list for all previous installed versions of Adobe Acrobat Reader. Uninstall/Remove each of them.

              Once old versions are gone, please install the newest version.
              ===========================================

              Download Disable/Remove Windows Messenger to the desktop to remove Windows Messenger.

              Do not confuse Windows Messenger with MSN Messenger because they are not the same. Windows Messenger is a frequent cause of popups.

              Unzip the file on the desktop. Open the MessengerDisable.exe and choose the bottom box - Uninstall Windows Messenger and click Apply.

              Exit out of MessengerDisable then delete the two files that were put on the desktop.

              ====================================

              Add or Remove Programs

              1. Click on the Windows Start button and click on the Control Panel
              2. In the Control Panel window, double-click Add or Remove Programs icon.
              3. When the Add or Remove Programs window has fully populated, check for McAfee Security Scan and uninstall it.

              =======================================

              Open HijackThis and select Do a system scan only

              Place a check mark next to the following entries: (if there)

              R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
              O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot (filesize 198160 bytes, MD5 4C784423B8F0DAE1392398356C9BE1FC)
              O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
              O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
              O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)
              O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)


              Important: Close all open windows except for HijackThis and then click Fix checked.

              Once completed, exit HijackThis.

              ========================================

              Download ComboFix by sUBs from one of the below links. 

              Important! You MUST save ComboFix to your desktop

              link # 1
              Link # 2

              Temporarily disable your Anti-virus and any Antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

              Double click on ComboFix.exe & follow the prompts.

              Vista users Right-Click on ComboFix.exe and select Run as administrator (you will receive a UAC prompt, please allow it)

              Do not mouse-click ComboFix's window while it is running. That may cause it to stall.

              When the scan completes it will open a text window.
               
              Post the contents of that log in your next reply.

              Remember to re-enable your Anti-virus and Antispyware protection when ComboFix is complete.

              Windows 8 and Windows 10 dual boot with two SSD's

              undredseesee

                Topic Starter


                Rookie

                Re: "An Installer Wants to Run" when I press remove
                « Reply #9 on: July 28, 2010, 08:05:53 AM »
                Thanks for your prompt reply Dave.  Here's the ComboFix log, and I've re-enabled Avast:

                ComboFix 10-07-27.04 - Owner 28/07/2010  14:37:00.1.1 - x86
                Microsoft Windows XP Home Edition  5.1.2600.3.1252.1.1033.18.511.168 [GMT 1:00]
                Running from: c:\documents and settings\Owner\My Documents\ComboFix.exe
                AV: avast! Antivirus *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
                FW: Online Armor Firewall *enabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}
                .

                (((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
                .

                c:\docume~1\Owner\LOCALS~1\Temp\install_flash_player.exe
                c:\documents and settings\Owner\System
                c:\documents and settings\Owner\System\win_qs8.jqx
                c:\program files\Fast Browser Search
                c:\program files\Fast Browser Search\IE\1.bat
                c:\program files\Fast Browser Search\IE\about.html
                c:\program files\Fast Browser Search\IE\affid.dat
                c:\program files\Fast Browser Search\IE\basis.xml
                c:\program files\Fast Browser Search\IE\ClearRecycleBin.exe
                c:\program files\Fast Browser Search\IE\error.html
                c:\program files\Fast Browser Search\IE\FBSPlugin.dll
                c:\program files\Fast Browser Search\IE\fbsProtection.xml
                c:\program files\Fast Browser Search\IE\FbsSearchProvider.xml
                c:\program files\Fast Browser Search\IE\FbsSearchProviderIE8.exe
                c:\program files\Fast Browser Search\IE\fbstoolbar.jar
                c:\program files\Fast Browser Search\IE\fbstoolbar.manifest
                c:\program files\Fast Browser Search\IE\icons.bmp
                c:\program files\Fast Browser Search\IE\info.txt
                c:\program files\Fast Browser Search\IE\local.xml
                c:\program files\Fast Browser Search\IE\logobg.bmp
                c:\program files\Fast Browser Search\IE\MTWBtoolbar.html
                c:\program files\Fast Browser Search\IE\search.bmp
                c:\program files\Fast Browser Search\IE\SearchGuardPlus.exe
                c:\program files\Fast Browser Search\IE\SearchGuardPlus.ico
                c:\program files\Fast Browser Search\IE\SGPU.ico
                c:\program files\Fast Browser Search\IE\sgpUpdater.exe
                c:\program files\Fast Browser Search\IE\sgpUpdater.xml
                c:\program files\Fast Browser Search\IE\SGPUpdaterS.exe
                c:\program files\Fast Browser Search\IE\tbs_include_script_003175.js
                c:\program files\Fast Browser Search\IE\tbs_include_script_005064.js
                c:\program files\Fast Browser Search\IE\tbs_include_script_012817.js
                c:\program files\Fast Browser Search\IE\Toolbar Help.htm
                c:\program files\Fast Browser Search\IE\uninstall.exe
                c:\program files\Fast Browser Search\IE\uninstalSGP.exe
                c:\program files\Fast Browser Search\IE\uninstalSGPU.exe
                c:\program files\Fast Browser Search\IE\update.exe
                c:\program files\Fast Browser Search\IE\version.txt
                c:\program files\Search Guard Plus
                c:\program files\Search Guard Plus\fbsProtection.xml
                c:\program files\Search Guard Plus\fbsSearchProvider.xml
                c:\program files\Search Guard Plus\FbsSearchProviderIE8.exe
                c:\program files\Search Guard Plus\SearchGuardPlus.exe
                c:\program files\Search Guard Plus\SearchGuardPlus.ico
                c:\program files\Search Guard Plus\uninstalSGP.exe
                c:\program files\Search Guard PlusU
                c:\program files\Search Guard PlusU\SGPU.ico
                c:\program files\Search Guard PlusU\sgpUpdater.exe
                c:\program files\Search Guard PlusU\sgpUpdater.xml
                c:\program files\Search Guard PlusU\sgpUpdaters.exe
                c:\program files\Search Guard PlusU\uninstalSGPU.exe
                c:\program files\SGPSA
                c:\windows\a3kebook.ini
                c:\windows\akebook.ini
                c:\windows\ANS2000.INI
                c:\windows\Downloaded Program Files\f3initialsetup1.0.1.3.inf

                .
                (((((((((((((((((((((((((   Files Created from 2010-06-28 to 2010-07-28  )))))))))))))))))))))))))))))))
                .

                2010-07-27 11:22 . 2010-07-27 11:22   --------   d-----w-   c:\program files\Trend Micro
                2010-07-27 09:37 . 2010-04-29 14:39   38224   ----a-w-   c:\windows\system32\drivers\mbamswissarmy.sys
                2010-07-27 09:37 . 2010-07-27 09:37   --------   d-----w-   c:\program files\Malwarebytes' Anti-Malware
                2010-07-27 09:37 . 2010-04-29 14:39   20952   ----a-w-   c:\windows\system32\drivers\mbam.sys
                2010-07-25 09:56 . 2010-07-25 09:56   --------   d-----w-   c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com
                2010-07-25 09:56 . 2010-07-25 09:56   --------   d-----w-   c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
                2010-07-25 09:55 . 2010-07-25 11:18   --------   d-----w-   c:\program files\SUPERAntiSpyware
                2010-07-20 15:28 . 2010-07-22 16:36   --------   d-----w-   c:\documents and settings\All Users\Application Data\OnlineArmor
                2010-07-20 15:28 . 2010-07-20 15:28   --------   d-----w-   c:\documents and settings\Owner\Application Data\OnlineArmor
                2010-07-20 15:27 . 2010-07-07 11:25   22600   ----a-w-   c:\windows\system32\drivers\OAmon.sys
                2010-07-20 15:27 . 2010-07-07 11:25   28232   ----a-w-   c:\windows\system32\drivers\OAnet.sys
                2010-07-20 15:27 . 2010-07-07 11:25   236104   ----a-w-   c:\windows\system32\drivers\OADriver.sys
                2010-07-20 15:27 . 2010-07-20 15:27   --------   d-----w-   c:\program files\Emsisoft
                2010-07-19 17:19 . 2010-06-28 20:37   165456   ----a-w-   c:\windows\system32\drivers\aswSP.sys
                2010-07-19 17:19 . 2010-06-28 20:32   17744   ----a-w-   c:\windows\system32\drivers\aswFsBlk.sys
                2010-07-19 17:19 . 2010-06-28 20:33   23376   ----a-w-   c:\windows\system32\drivers\aswRdr.sys
                2010-07-19 17:19 . 2010-06-28 20:37   46672   ----a-w-   c:\windows\system32\drivers\aswTdi.sys
                2010-07-19 17:19 . 2010-06-28 20:32   100176   ----a-w-   c:\windows\system32\drivers\aswmon2.sys
                2010-07-19 17:19 . 2010-06-28 20:32   94544   ----a-w-   c:\windows\system32\drivers\aswmon.sys
                2010-07-19 17:19 . 2010-06-28 20:32   28880   ----a-w-   c:\windows\system32\drivers\aavmker4.sys
                2010-07-19 17:19 . 2010-06-28 20:57   38848   ----a-w-   c:\windows\avastSS.scr
                2010-07-19 17:19 . 2010-06-28 20:57   165032   ----a-w-   c:\windows\system32\aswBoot.exe
                2010-07-19 17:19 . 2010-07-19 17:19   --------   d-----w-   c:\documents and settings\All Users\Application Data\Alwil Software
                2010-07-17 16:55 . 2010-07-17 16:55   --------   d-----w-   c:\documents and settings\Owner\Local Settings\Application Data\ABBYY
                2010-07-15 07:34 . 2010-06-14 14:31   744448   -c----w-   c:\windows\system32\dllcache\helpsvc.exe

                .
                ((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
                .
                2010-07-28 11:21 . 2008-05-12 22:03   --------   d-----w-   c:\program files\Common Files\Adobe
                2010-07-25 09:59 . 2010-07-25 09:59   63488   ----a-w-   c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
                2010-07-25 09:59 . 2010-07-25 09:59   52224   ----a-w-   c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
                2010-07-25 09:58 . 2010-07-25 09:58   117760   ----a-w-   c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
                2010-07-20 15:11 . 2008-05-15 16:04   --------   d-----w-   c:\program files\NoAdware5.0
                2010-07-19 17:19 . 2006-09-19 10:10   --------   d-----w-   c:\program files\Alwil Software
                2010-07-06 11:16 . 2010-05-10 13:29   --------   d-----w-   c:\program files\ABBYY FineReader 6.0 Sprint
                2010-07-01 19:04 . 2010-04-01 12:13   439816   ----a-w-   c:\documents and settings\Owner\Application Data\Real\Update\setup3.10\setup.exe
                2010-06-23 06:57 . 2010-06-23 06:57   501936   ----a-w-   c:\documents and settings\All Users\Application Data\Google\Google Toolbar\Update\gtbC.tmp.exe
                2010-06-14 14:31 . 2006-01-20 11:42   744448   ----a-w-   c:\windows\pchealth\helpctr\binaries\helpsvc.exe
                2010-05-06 10:41 . 2004-08-04 12:00   916480   ----a-w-   c:\windows\system32\wininet.dll
                2010-05-02 05:22 . 2004-08-04 12:00   1851264   ----a-w-   c:\windows\system32\win32k.sys
                2006-06-25 13:25 . 2006-06-25 13:25   53945   ----a-w-   c:\program files\Ent.pdf
                .

                (((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
                .
                .
                *Note* empty entries & legit default entries are not shown
                REGEDIT4

                [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
                "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-10 68856]

                [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
                "SoundMan"="SOUNDMAN.EXE" [2005-04-15 77824]
                "ATICCC"="c:\program files\ATI Technologies\ATI.ACE\cli.exe" [2005-08-06 61440]
                "NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
                "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-01-20 98304]
                "WorksFUD"="c:\program files\Microsoft Works\wkfud.exe" [2000-07-13 24576]
                "Microsoft Works Portfolio"="c:\program files\Microsoft Works\WksSb.exe" [2000-07-13 311350]
                "Microsoft Works Update Detection"="c:\program files\Microsoft Works\WkDetect.exe" [2000-07-13 28739]
                "SpeedTouch USB Diagnostics"="c:\program files\Thomson\SpeedTouch USB\Dragdiag.exe" [2004-01-26 866816]
                "EPSON Stylus C48 Series (Copy 1)"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_S4I091.EXE" [2005-05-16 99840]
                "Adobe Photo Downloader"="c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe" [2005-06-06 57344]
                "EEventManager"="c:\progra~1\EPSONS~1\EVENTM~1\EEventManager.exe" [2008-12-04 665424]
                "avast5"="c:\progra~1\ALWILS~1\Avast5\avastUI.exe" [2010-06-28 2837864]
                "@OnlineArmor GUI"="c:\program files\Emsisoft\Online Armor\oaui.exe" [2010-07-07 6854984]

                [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
                "CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

                c:\documents and settings\All Users\Start Menu\Programs\Startup\
                ATI CATALYST System Tray.lnk - c:\program files\ATI Technologies\ATI.ACE\CLI.exe [2005-8-6 61440]
                McAfee Security Scan.lnk - c:\program files\McAfee Security Scan\1.0.150\SSScheduler.exe [2009-7-28 199184]
                Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-17 65588]
                Microsoft Works Calendar Reminders.lnk - c:\program files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe [2000-7-13 24633]

                [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
                "{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\Emsisoft\ONLINE~1\oaevent.dll" [2010-07-07 924488]
                "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

                [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
                2009-09-03 22:21   548352   ----a-w-   c:\program files\SUPERAntiSpyware\SASWINLO.DLL

                [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^VIA RAID TOOL.lnk]
                path=c:\documents and settings\All Users\Start Menu\Programs\Startup\VIA RAID TOOL.lnk
                backup=c:\windows\pss\VIA RAID TOOL.lnkCommon Startup

                [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
                "EnableFirewall"= 0 (0x0)

                [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
                "%windir%\\system32\\sessmgr.exe"=
                "c:\\Program Files\\Thomson\\SpeedTouch USB\\stdialup.exe"=
                "c:\\Program Files\\Thomson\\SpeedTouch USB\\dragdiag.exe"=
                "c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
                "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
                "c:\\Program Files\\Epson Software\\Event Manager\\EEventManager.exe"=

                R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [19/07/2010 18:19 165456]
                R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [20/07/2010 16:27 236104]
                R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [20/07/2010 16:27 22600]
                R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [20/07/2010 16:27 28232]
                R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [17/02/2010 19:25 12872]
                R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [10/05/2010 19:41 67656]
                R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [19/07/2010 18:19 17744]
                R2 OAcat;Online Armor Helper Service;c:\program files\Emsisoft\Online Armor\oacat.exe [20/07/2010 16:27 1283400]
                R2 SvcOnlineArmor;Online Armor;c:\program files\Emsisoft\Online Armor\oasrv.exe [20/07/2010 16:27 3364680]
                S1 SABKUTIL;SABKUTIL;\??\c:\program files\SUPERAntiSpyware\SABKUTIL.sys --> c:\program files\SUPERAntiSpyware\SABKUTIL.sys [?]
                S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [01/02/2010 10:20 135664]

                [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
                getPlusHelper   REG_MULTI_SZ      getPlusHelper
                .
                Contents of the 'Scheduled Tasks' folder

                2010-07-28 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
                - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-01 09:20]

                2010-07-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
                - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-01 09:20]

                2010-07-28 c:\windows\Tasks\SDMsgUpdate (TE).job
                - c:\progra~1\SMARTD~1\Messages\SDNotify.exe [2009-11-19 16:21]

                2010-07-28 c:\windows\Tasks\User_Feed_Synchronization-{7AE12109-6E2D-4DC7-A308-BFF8043A80A9}.job
                - c:\windows\system32\msfeedssync.exe [2006-10-17 03:31]
                .
                .
                ------- Supplementary Scan -------
                .
                uStart Page = hxxp://www.google.co.uk/
                uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
                uSearchAssistant = hxxp://www.google.com/ie
                uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
                IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
                TCP: {E2E93190-FF51-4025-97C6-3710BE4A8D1E} = 212.139.132.42 212.139.132.41
                Name-Space Handler: ftp\* - {419A0123-4312-1122-A0C0-434FDA6DA542} - c:\program files\CoreFTP\pftpns.dll
                .
                - - - - ORPHANS REMOVED - - - -

                HKCU-Run-NoAdware4 - c:\program files\NoAdware4\NoAdware4.exe
                HKLM-Run-FBSearch - c:\program files\Search Guard Plus\SearchGuardPlus.exe



                **************************************************************************

                catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
                Rootkit scan 2010-07-28 14:51
                Windows 5.1.2600 Service Pack 3 NTFS

                scanning hidden processes ... 

                scanning hidden autostart entries ...

                HKLM\Software\Microsoft\Windows\CurrentVersion\Run
                  FBSearch = c:\program files\Search Guard Plus\SearchGuardPlus.exe?????????????????????????????????????????????

                scanning hidden files ... 

                scan completed successfully
                hidden files: 0

                **************************************************************************
                .
                --------------------- DLLs Loaded Under Running Processes ---------------------

                - - - - - - - > 'winlogon.exe'(448)
                c:\program files\SUPERAntiSpyware\SASWINLO.DLL
                c:\windows\system32\WININET.dll
                c:\windows\system32\Ati2evxx.dll
                .
                Completion time: 2010-07-28  14:59:18
                ComboFix-quarantined-files.txt  2010-07-28 13:59

                Pre-Run: 106,965,536,768 bytes free
                Post-Run: 107,319,209,984 bytes free

                WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
                [boot loader]
                timeout=2
                default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
                [operating systems]
                c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
                multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

                - - End Of File - - 1816789A5A6B81C04652B90D76D7EA33

                SuperDave

                • Malware Removal Specialist
                • Moderator


                • Genius
                • Thanked: 1020
                • Certifications: List
                • Experience: Expert
                • OS: Windows 10
                Re: "An Installer Wants to Run" when I press remove
                « Reply #10 on: July 28, 2010, 01:27:07 PM »
                Please download RootRepeal from GooglePages.com.
                • Extract the program file to your Desktop.
                • Run the program RootRepeal.exe and go to the Report tab and click on the Scan button.


                • Select ALL of the checkboxes and then click OK and it will start scanning your system.

                • If you have multiple drives you only need to check the C: drive or the one Windows is installed on.
                • When done, click on Save Report
                • Save it to the Desktop.
                • Please copy/paste the contents of the report in your next reply.
                Please remove any e-mail address in the RootRepeal report (if present).

                Windows 8 and Windows 10 dual boot with two SSD's

                undredseesee

                  Topic Starter


                  Rookie

                  Re: "An Installer Wants to Run" when I press remove
                  « Reply #11 on: July 29, 2010, 10:32:13 AM »
                  Thanks, SuperDave.  Results from RootRepeal are:

                  ROOTREPEAL (c) AD, 2007-2009
                  ==================================================
                  Scan Start Time:      2010/07/29 17:24
                  Program Version:      Version 1.3.5.0
                  Windows Version:      Windows XP SP3
                  ==================================================

                  Drivers
                  -------------------
                  Name: dump_atapi.sys
                  Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
                  Address: 0xEF7A8000   Size: 98304   File Visible: No   Signed: -
                  Status: -

                  Name: dump_WMILIB.SYS
                  Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
                  Address: 0xF8B72000   Size: 8192   File Visible: No   Signed: -
                  Status: -

                  Name: Fastfat.SYS
                  Image Path: C:\WINDOWS\System32\Drivers\Fastfat.SYS
                  Address: 0xED1EC000   Size: 143744   File Visible: -   Signed: -
                  Status: Hidden from the Windows API!

                  Name: Ntfs.sys
                  Image Path: Ntfs.sys
                  Address: 0xF836C000   Size: 574976   File Visible: -   Signed: -
                  Status: Hidden from the Windows API!

                  Name: rootrepeal.sys
                  Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
                  Address: 0xEC92C000   Size: 49152   File Visible: No   Signed: -
                  Status: -

                  SSDT
                  -------------------
                  #: 017   Function Name: NtAllocateVirtualMemory
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93bed0

                  #: 019   Function Name: NtAssignProcessToJobObject
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93c700

                  #: 025   Function Name: NtClose
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8cd2

                  #: 031   Function Name: NtConnectPort
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef939da0

                  #: 037   Function Name: NtCreateFile
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9499c0

                  #: 041   Function Name: NtCreateKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8b8e

                  #: 046   Function Name: NtCreatePort
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9398e0

                  #: 047   Function Name: NtCreateProcess
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef936620

                  #: 048   Function Name: NtCreateProcessEx
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef936a30

                  #: 050   Function Name: NtCreateSection
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef935ef0

                  #: 053   Function Name: NtCreateThread
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef937f20

                  #: 057   Function Name: NtDebugActiveProcess
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef938b90

                  #: 063   Function Name: NtDeleteKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c9142

                  #: 065   Function Name: NtDeleteValueKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c906c

                  #: 068   Function Name: NtDuplicateObject
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8764

                  #: 097   Function Name: NtLoadDriver
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93b490

                  #: 116   Function Name: NtOpenFile
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef94a040

                  #: 119   Function Name: NtOpenKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8c68

                  #: 122   Function Name: NtOpenProcess
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c86a4

                  #: 125   Function Name: NtOpenSection
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef936310

                  #: 128   Function Name: NtOpenThread
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8708

                  #: 137   Function Name: NtProtectVirtualMemory
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93c350

                  #: 145   Function Name: NtQueryDirectoryFile
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93ba70

                  #: 177   Function Name: NtQueryValueKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8d88

                  #: 180   Function Name: NtQueueApcThread
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93c8a0

                  #: 192   Function Name: NtRenameKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c9210

                  #: 199   Function Name: NtRequestPort
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93a9a0

                  #: 200   Function Name: NtRequestWaitReplyPort
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93af90

                  #: 204   Function Name: NtRestoreKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8d48

                  #: 206   Function Name: NtResumeThread
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef939340

                  #: 210   Function Name: NtSecureConnectPort
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93a190

                  #: 213   Function Name: NtSetContextThread
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef938970

                  #: 240   Function Name: NtSetSystemInformation
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef938d30

                  #: 247   Function Name: NtSetValueKey
                  Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef7c8ec8

                  #: 249   Function Name: NtShutdownSystem
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93b370

                  #: 253   Function Name: NtSuspendProcess
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef939520

                  #: 254   Function Name: NtSuspendThread
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef939130

                  #: 255   Function Name: NtSystemDebugControl
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef938f40

                  #: 257   Function Name: NtTerminateProcess
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef937c80

                  #: 258   Function Name: NtTerminateThread
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef938760

                  #: 262   Function Name: NtUnloadDriver
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93b780

                  #: 277   Function Name: NtWriteVirtualMemory
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef93c520

                  Shadow SSDT
                  -------------------
                  #: 007   Function Name: NtGdiAlphaBlend
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef934160

                  #: 013   Function Name: NtGdiBitBlt
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef933480

                  #: 033   Function Name: NtGdiCreateDIBSection
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef934510

                  #: 191   Function Name: NtGdiGetPixel
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9337d0

                  #: 227   Function Name: NtGdiMaskBlt
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef933a80

                  #: 233   Function Name: NtGdiOpenDCW
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef934880

                  #: 298   Function Name: NtGdiTransparentBlt
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef933e10

                  #: 307   Function Name: NtUserAttachThreadInput
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef92ff60

                  #: 310   Function Name: NtUserBlockInput
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef931d60

                  #: 319   Function Name: NtUserCallHwndParamLock
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef931890

                  #: 324   Function Name: NtUserCallTwoParam
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9329d0

                  #: 383   Function Name: NtUserGetAsyncKeyState
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef930a10

                  #: 389   Function Name: NtUserGetClipboardData
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef932110

                  #: 401   Function Name: NtUserGetDC
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef932dc0

                  #: 402   Function Name: NtUserGetDCEx
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef933020

                  #: 414   Function Name: NtUserGetKeyboardState
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9308e0

                  #: 416   Function Name: NtUserGetKeyState
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9307b0

                  #: 439   Function Name: NtUserGetWindowDC
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef933290

                  #: 460   Function Name: NtUserMessageCall
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef930b40

                  #: 465   Function Name: NtUserMoveWindow
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9324f0

                  #: 475   Function Name: NtUserPostMessage
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef931020

                  #: 476   Function Name: NtUserPostThreadMessage
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9314d0

                  #: 491   Function Name: NtUserRegisterRawInputDevices
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef92fd70

                  #: 502   Function Name: NtUserSendInput
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef931b10

                  #: 509   Function Name: NtUserSetClipboardViewer
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef931f00

                  #: 529   Function Name: NtUserSetParent
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef9322b0

                  #: 546   Function Name: NtUserSetWindowPos
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef932880

                  #: 548   Function Name: NtUserSetWindowsHookAW
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef92f820

                  #: 549   Function Name: NtUserSetWindowsHookEx
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef92f3c0

                  #: 552   Function Name: NtUserSetWinEventHook
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef92fac0

                  #: 555   Function Name: NtUserShowWindow
                  Status: Hooked by "C:\WINDOWS\system32\drivers\OADriver.sys" at address 0xef932790

                  ==EOF==

                  SuperDave

                  • Malware Removal Specialist
                  • Moderator


                  • Genius
                  • Thanked: 1020
                  • Certifications: List
                  • Experience: Expert
                  • OS: Windows 10
                  Re: "An Installer Wants to Run" when I press remove
                  « Reply #12 on: July 29, 2010, 01:26:19 PM »
                  I'd like to scan your machine with ESET OnlineScan

                  •Hold down Control and click on the following link to open ESET OnlineScan in a new window.
                  ESET OnlineScan
                  •Click the button.
                  •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
                  • Click on to download the ESET Smart Installer. Save it to your desktop.
                  • Double click on the icon on your desktop.
                  •Check
                  •Click the button.
                  •Accept any security warnings from your browser.
                  •Check
                  •Push the Start button.
                  •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
                  •When the scan completes, push
                  •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
                  •Push the button.
                  •Push
                  A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt

                  Windows 8 and Windows 10 dual boot with two SSD's

                  undredseesee

                    Topic Starter


                    Rookie

                    Re: "An Installer Wants to Run" when I press remove
                    « Reply #13 on: July 31, 2010, 05:30:10 AM »
                    Thanks Dave.

                    Contents of ESET report:

                    C:\System Volume Information\_restore{09738AC8-D5DD-4540-B9A9-3C2CFE6E57D8}\RP927\A0152301.exe   probably a variant of Win32/Adware.ErrorClean application

                    SuperDave

                    • Malware Removal Specialist
                    • Moderator


                    • Genius
                    • Thanked: 1020
                    • Certifications: List
                    • Experience: Expert
                    • OS: Windows 10
                    Re: "An Installer Wants to Run" when I press remove
                    « Reply #14 on: July 31, 2010, 05:04:48 PM »
                    If there are no other issues it's time for some clean-up-

                    * Click START then RUN - Vista users press the Windows Key and the R keys for the Run box.
                    * Now type Combofix /uninstall in the runbox
                    * Make sure there's a space between Combofix and /Uninstall
                    * Then hit Enter

                    * The above procedure will:
                    * Delete the following:
                    * ComboFix and its associated files and folders.
                    * Reset the clock settings.
                    * Hide file extensions, if required.
                    * Hide System/Hidden files, if required.
                    * Set a new, clean Restore Point.

                    =============================

                    Download OTC by OldTimer and save it to your desktop.

                    1. Double-click OTC to run it.
                    2. Click the CleanUp! button.
                    3. Select Yes when the "Begin cleanup Process?" prompt appears.
                    4. If you are prompted to Reboot during the cleanup, select Yes
                    5. OTC should delete itself once it finishes, if not delete it yourself.

                    ============================

                    Clean out your temporary internet files and temp files.

                    Download TFC by OldTimer to your desktop.

                    Double-click TFC.exe to run it.

                    Note: If you are running on Vista, right-click on the file and choose Run As Administrator

                    TFC will close all programs when run, so make sure you have saved all your work before you begin.

                    * Click the Start button to begin the cleaning process.
                    * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
                    * Please let TFC run uninterrupted until it is finished.

                    Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.

                    ==============================

                    Use the Secunia Software Inspector to check for out of date software.

                    •Click Start Now

                    •Check the box next to Enable thorough system inspection.

                    •Click Start

                    •Allow the scan to finish and scroll down to see if any updates are needed.
                    •Update anything listed.
                    .
                    ----------

                    Go to Microsoft Windows Update and get all critical updates.

                    ----------

                    I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

                    SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
                    * Using SpywareBlaster to protect your computer from Spyware and Malware
                    * If you don't know what ActiveX controls are, see here

                    Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

                    Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

                    Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
                    Safe Surfing!
                    Windows 8 and Windows 10 dual boot with two SSD's