Jump to content

Mr.Smurf

Members
  • Posts

    8
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Sorry, I didn't follow directions properly Heres the log, I hope this helps. Volume in drive C has no label. Volume Serial Number is 006D-ABB4 Directory of C:\Documents and Settings\Jesse M\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine 10/22/2008 05:41 <DIR> . 10/22/2008 05:41 <DIR> .. 10/15/2008 16:54 80 BACKUP1.12401 10/15/2008 16:54 81 BACKUP1.13104 10/15/2008 16:54 76 BACKUP1.13596 10/15/2008 16:54 98 BACKUP1.13776 10/15/2008 16:54 73 BACKUP1.14138 08/16/2008 23:07 92 BACKUP1.15175 08/16/2008 23:07 76 BACKUP1.15637 10/02/2008 18:46 71 BACKUP1.16519 10/15/2008 16:54 78 BACKUP1.16964 10/15/2008 16:54 81 BACKUP1.17036 10/15/2008 16:54 82 BACKUP1.17402 10/15/2008 16:55 90 BACKUP1.18874 10/15/2008 16:54 80 BACKUP1.19862 10/15/2008 16:55 111 BACKUP1.19873 10/15/2008 16:54 86 BACKUP1.20437 10/15/2008 16:54 115 BACKUP1.21467 10/02/2008 18:46 155 BACKUP1.21808 10/15/2008 16:54 76 BACKUP1.22863 10/15/2008 16:54 155 BACKUP1.22990 10/02/2008 18:46 82 BACKUP1.23211 10/15/2008 16:54 78 BACKUP1.23343 10/15/2008 16:54 156 BACKUP1.23451 10/15/2008 16:54 76 BACKUP1.23963 10/15/2008 16:54 67 BACKUP1.26010 10/15/2008 16:54 76 BACKUP1.26221 10/15/2008 16:54 89 BACKUP1.26261 10/15/2008 16:54 81 BACKUP1.26549 10/02/2008 18:46 83 BACKUP1.27348 10/15/2008 16:54 81 BACKUP1.28958 10/02/2008 18:46 150 BACKUP1.29412 10/15/2008 16:54 83 BACKUP1.30374 10/15/2008 16:54 80 BACKUP1.31923 10/15/2008 16:54 158 BACKUP1.31947 10/15/2008 16:54 79 BACKUP1.32652 10/15/2008 16:54 79 BACKUP1.32802 10/15/2008 16:54 91 BACKUP1.32977 08/16/2008 23:07 89 BACKUP1.33561 10/02/2008 18:46 80 BACKUP1.33769 10/02/2008 18:46 80 BACKUP1.33979 10/02/2008 18:46 128 BACKUP1.34711 10/15/2008 16:54 83 BACKUP1.39026 10/15/2008 16:54 75 BACKUP1.39805 10/15/2008 16:54 79 BACKUP1.40874 10/15/2008 16:54 81 BACKUP1.41244 10/15/2008 16:55 109 BACKUP1.41382 10/15/2008 16:54 86 BACKUP1.41616 10/15/2008 16:54 94 BACKUP1.42213 10/15/2008 16:54 81 BACKUP1.42803 10/15/2008 16:54 84 BACKUP1.42851 10/15/2008 16:54 81 BACKUP1.43852 10/15/2008 16:54 81 BACKUP1.43972 08/16/2008 23:07 73 BACKUP1.44398 10/15/2008 16:54 89 BACKUP1.45747 10/15/2008 16:54 83 BACKUP1.46483 10/15/2008 16:54 63 BACKUP1.47301 10/15/2008 16:54 94 BACKUP1.48016 10/15/2008 16:54 95 BACKUP1.48087 10/15/2008 16:54 79 BACKUP1.48557 10/15/2008 16:54 82 BACKUP1.53144 10/15/2008 16:54 153 BACKUP1.53304 10/15/2008 16:54 85 BACKUP1.53434 10/15/2008 16:54 94 BACKUP1.53738 10/15/2008 16:54 70 BACKUP1.55293 10/15/2008 16:54 79 BACKUP1.55521 10/15/2008 16:54 157 BACKUP1.56161 10/15/2008 16:54 81 BACKUP1.56247 10/15/2008 16:54 74 BACKUP1.56449 10/15/2008 16:54 80 BACKUP1.56666 10/15/2008 16:55 111 BACKUP1.56909 10/15/2008 16:54 86 BACKUP1.57363 10/15/2008 16:54 84 BACKUP1.57536 10/15/2008 16:54 87 BACKUP1.59904 10/15/2008 16:54 78 BACKUP1.60780 10/15/2008 16:54 77 BACKUP1.61996 10/15/2008 16:54 166 BACKUP1.62762 10/15/2008 16:54 116 BACKUP1.63575 10/15/2008 16:54 76 BACKUP1.63621 08/16/2008 23:07 89 BACKUP1.63872 10/15/2008 16:54 81 BACKUP1.64158 10/15/2008 16:54 79 BACKUP1.64280 10/15/2008 16:54 81 BACKUP1.64671 10/15/2008 16:54 79 BACKUP1.64737 10/15/2008 16:54 129 BACKUP1.65203 10/15/2008 16:54 84 BACKUP1.65543 08/16/2008 23:07 70 BACKUP1.65846 10/15/2008 16:54 79 BACKUP1.66088 10/02/2008 18:46 56 BACKUP1.66547 10/15/2008 16:54 83 BACKUP1.66699 10/15/2008 16:54 83 BACKUP1.66961 10/15/2008 16:54 84 BACKUP1.67996 08/16/2008 23:07 89 BACKUP1.68057 10/15/2008 16:54 160 BACKUP1.70867 10/15/2008 16:54 85 BACKUP1.70982 10/15/2008 16:54 77 BACKUP1.71680 10/02/2008 18:46 119 BACKUP1.72132 10/15/2008 16:54 79 BACKUP1.72634 10/02/2008 18:46 82 BACKUP1.72735 10/15/2008 16:54 81 BACKUP1.72803 10/15/2008 16:54 81 BACKUP1.73951 10/15/2008 16:55 113 BACKUP1.74141 10/15/2008 16:54 85 BACKUP1.74215 10/15/2008 16:54 86 BACKUP1.75288 08/16/2008 23:07 89 BACKUP1.75425 08/16/2008 23:07 91 BACKUP1.75574 10/02/2008 18:46 80 BACKUP1.76113 10/15/2008 16:54 79 BACKUP1.77210 10/15/2008 16:54 156 BACKUP1.78510 10/15/2008 16:54 153 BACKUP1.78830 10/02/2008 18:46 82 BACKUP1.78856 10/15/2008 16:55 113 BACKUP1.80334 10/15/2008 16:54 81 BACKUP1.80964 10/15/2008 16:54 80 BACKUP1.82746 10/15/2008 16:54 81 BACKUP1.83195 08/16/2008 23:07 92 BACKUP1.83256 10/15/2008 16:54 93 BACKUP1.83829 10/15/2008 16:54 88 BACKUP1.85352 08/16/2008 23:07 89 BACKUP1.85490 10/15/2008 16:54 76 BACKUP1.86076 10/15/2008 16:54 151 BACKUP1.86185 10/15/2008 16:54 83 BACKUP1.86222 10/15/2008 16:54 81 BACKUP1.87706 10/15/2008 16:54 87 BACKUP1.88477 10/15/2008 16:54 98 BACKUP1.88709 10/15/2008 16:54 73 BACKUP1.89425 10/15/2008 16:54 79 BACKUP1.89572 08/16/2008 23:07 73 BACKUP1.89969 10/15/2008 16:55 108 BACKUP1.89991 10/15/2008 16:54 77 BACKUP1.90266 10/15/2008 16:54 116 BACKUP1.90358 10/02/2008 18:46 82 BACKUP1.92498 10/15/2008 16:54 79 BACKUP1.92797 10/15/2008 16:54 81 BACKUP1.94332 10/15/2008 16:54 81 BACKUP1.94822 10/15/2008 16:54 79 BACKUP1.94871 10/15/2008 16:54 78 BACKUP1.94951 10/15/2008 16:54 79 BACKUP1.95656 10/15/2008 16:55 115 BACKUP1.96795 10/02/2008 18:46 70 BACKUP1.97374 10/15/2008 16:55 83 BACKUP1.97391 10/02/2008 18:46 77 BACKUP1.97567 10/15/2008 16:54 78 BACKUP1.97873 10/15/2008 16:54 85 BACKUP1.99371 10/02/2008 18:46 82 BACKUP1.99827 10/15/2008 16:54 80 BACKUP1.99881 10/15/2008 16:54 74 BACKUP2.14809 08/16/2008 23:07 85 BACKUP2.53862 10/15/2008 16:54 82 BACKUP2.60104 10/15/2008 16:54 79 BACKUP2.64234 10/15/2008 16:54 82 BACKUP2.64641 10/15/2008 16:54 89 BACKUP2.68045 10/15/2008 16:54 80 BACKUP2.74093 10/15/2008 16:54 74 BACKUP2.91213 10/15/2008 16:54 87 BACKUP2.99269 10/15/2008 16:54 81 BACKUP2.99754 10/15/2008 16:54 119 BACKUP3.11554 10/15/2008 16:55 127 BACKUP3.11654 10/15/2008 16:54 123 BACKUP3.12639 10/15/2008 16:55 125 BACKUP3.13033 10/02/2008 18:46 146 BACKUP3.13120 10/15/2008 16:54 123 BACKUP3.13148 10/15/2008 16:54 103 BACKUP3.13823 10/15/2008 16:54 128 BACKUP3.13858 10/02/2008 18:46 120 BACKUP3.13910 10/02/2008 18:46 189 BACKUP3.14694 10/15/2008 16:55 92 BACKUP3.15250 10/15/2008 16:54 127 BACKUP3.16355 10/15/2008 16:54 195 BACKUP3.17117 10/15/2008 16:54 156 BACKUP3.17792 10/15/2008 16:54 127 BACKUP3.20723 10/15/2008 16:54 139 BACKUP3.21536 10/15/2008 16:54 123 BACKUP3.22136 10/15/2008 16:55 192 BACKUP3.22530 10/02/2008 18:46 117 BACKUP3.22554 10/15/2008 16:54 145 BACKUP3.24637 10/15/2008 16:54 127 BACKUP3.24741 10/15/2008 16:54 121 BACKUP3.24750 10/15/2008 16:54 140 BACKUP3.26093 10/15/2008 16:54 127 BACKUP3.27169 08/16/2008 23:07 102 BACKUP3.28354 10/15/2008 16:54 195 BACKUP3.28773 10/15/2008 16:54 123 BACKUP3.29734 10/15/2008 16:54 103 BACKUP3.30157 10/15/2008 16:54 100 BACKUP3.32092 10/15/2008 16:54 195 BACKUP3.32764 10/15/2008 16:54 123 BACKUP3.34238 10/15/2008 16:54 119 BACKUP3.35002 08/16/2008 23:07 102 BACKUP3.35584 10/15/2008 16:54 127 BACKUP3.35761 10/15/2008 16:54 98 BACKUP3.36815 10/15/2008 16:54 94 BACKUP3.38068 10/15/2008 16:54 123 BACKUP3.38776 10/15/2008 16:54 101 BACKUP3.42232 08/16/2008 23:07 99 BACKUP3.42262 10/02/2008 18:46 99 BACKUP3.44449 10/15/2008 16:54 122 BACKUP3.44572 10/02/2008 18:46 106 BACKUP3.44827 10/15/2008 16:54 127 BACKUP3.46408 10/15/2008 16:54 123 BACKUP3.48602 10/02/2008 18:46 102 BACKUP3.50086 10/15/2008 16:55 97 BACKUP3.51771 10/15/2008 16:54 127 BACKUP3.52088 10/15/2008 16:54 123 BACKUP3.52634 10/15/2008 16:54 92 BACKUP3.53310 10/15/2008 16:55 107 BACKUP3.55115 10/15/2008 16:54 123 BACKUP3.56276 10/15/2008 16:54 112 BACKUP3.57519 10/15/2008 16:55 123 BACKUP3.59392 10/15/2008 16:54 123 BACKUP3.63435 10/15/2008 16:54 123 BACKUP3.65741 08/16/2008 23:07 99 BACKUP3.66595 10/15/2008 16:54 127 BACKUP3.66618 10/15/2008 16:54 190 BACKUP3.67148 10/15/2008 16:54 123 BACKUP3.68247 10/15/2008 16:54 123 BACKUP3.69107 10/15/2008 16:54 150 BACKUP3.69172 10/15/2008 16:54 110 BACKUP3.69711 10/15/2008 16:54 123 BACKUP3.70882 08/16/2008 23:07 185 BACKUP3.70907 10/15/2008 16:54 123 BACKUP3.76079 10/15/2008 16:54 123 BACKUP3.77261 10/15/2008 16:54 138 BACKUP3.78049 10/15/2008 16:54 119 BACKUP3.78718 10/15/2008 16:55 127 BACKUP3.79507 10/15/2008 16:54 101 BACKUP3.80256 10/15/2008 16:54 123 BACKUP3.81507 10/15/2008 16:54 123 BACKUP3.82128 10/15/2008 16:54 144 BACKUP3.82210 10/15/2008 16:55 97 BACKUP3.82894 10/15/2008 16:54 124 BACKUP3.83735 08/16/2008 23:07 116 BACKUP3.83866 10/15/2008 16:54 115 BACKUP3.84598 10/15/2008 16:54 195 BACKUP3.84633 10/15/2008 16:54 123 BACKUP3.84774 10/15/2008 16:54 125 BACKUP3.85065 10/15/2008 16:54 100 BACKUP3.85618 10/15/2008 16:54 90 BACKUP3.86476 10/15/2008 16:54 123 BACKUP3.86554 10/15/2008 16:54 96 BACKUP3.86886 10/15/2008 16:54 123 BACKUP3.89319 10/15/2008 16:54 121 BACKUP3.90994 10/02/2008 18:46 189 BACKUP3.92843 10/15/2008 16:54 123 BACKUP3.93843 10/15/2008 16:55 92 BACKUP3.94325 10/15/2008 16:54 127 BACKUP3.94863 10/02/2008 18:46 120 BACKUP3.95028 10/15/2008 16:54 88 BACKUP3.95101 10/15/2008 16:54 127 BACKUP3.99158 10/15/2008 16:54 161 BACKUP4.14272 10/15/2008 16:54 239 BACKUP4.27667 10/15/2008 16:54 172 BACKUP4.28646 10/15/2008 16:54 197 BACKUP4.29715 10/15/2008 16:54 195 BACKUP4.45996 10/02/2008 18:46 191 BACKUP4.91769 10/15/2008 16:54 192 BACKUP4.96680 10/22/2008 17:08 0 info.txt 10/15/2008 16:54 4,096 QUAR1.12401 10/15/2008 16:54 42,496 QUAR1.13104 10/15/2008 16:54 4,096 QUAR1.13596 10/15/2008 16:54 4,096 QUAR1.13776 10/15/2008 16:54 6,144 QUAR1.14138 08/16/2008 23:07 3,262 QUAR1.15175 08/16/2008 23:07 131,584 QUAR1.15637 10/02/2008 18:46 94,208 QUAR1.16519 10/15/2008 16:54 4,096 QUAR1.16964 10/15/2008 16:54 4,096 QUAR1.17036 10/15/2008 16:54 4,096 QUAR1.17402 10/15/2008 16:55 717 QUAR1.18874 10/15/2008 16:54 4,096 QUAR1.19862 10/15/2008 16:55 284 QUAR1.19873 10/15/2008 16:54 4,096 QUAR1.20437 10/15/2008 16:54 36,216 QUAR1.21467 10/02/2008 18:46 80,512 QUAR1.21808 10/15/2008 16:54 266,240 QUAR1.22863 10/15/2008 16:54 54,272 QUAR1.22990 10/02/2008 18:46 326,656 QUAR1.23211 10/15/2008 16:54 94,720 QUAR1.23343 10/15/2008 16:54 36,216 QUAR1.23451 10/15/2008 16:54 86,016 QUAR1.23963 10/15/2008 16:54 4,096 QUAR1.26010 10/15/2008 16:54 212,992 QUAR1.26221 10/15/2008 16:54 4,096 QUAR1.26261 10/15/2008 16:54 42,496 QUAR1.26549 10/02/2008 18:46 927,493 QUAR1.27348 10/15/2008 16:54 4,096 QUAR1.28958 10/02/2008 18:46 326,592 QUAR1.29412 10/15/2008 16:54 933,821 QUAR1.30374 10/15/2008 16:54 4,096 QUAR1.31923 10/15/2008 16:54 94,720 QUAR1.31947 10/15/2008 16:54 4,096 QUAR1.32652 10/15/2008 16:54 4,096 QUAR1.32802 10/15/2008 16:54 4,096 QUAR1.32977 08/16/2008 23:07 6,746 QUAR1.33561 10/02/2008 18:46 37,760 QUAR1.33769 10/02/2008 18:46 37,760 QUAR1.33979 10/02/2008 18:46 88,576 QUAR1.34711 10/15/2008 16:54 68,096 QUAR1.39026 10/15/2008 16:54 4,096 QUAR1.39805 10/15/2008 16:54 4,096 QUAR1.40874 10/15/2008 16:54 4,096 QUAR1.41244 10/15/2008 16:55 284 QUAR1.41382 10/15/2008 16:54 27,648 QUAR1.41616 10/15/2008 16:54 13,309 QUAR1.42213 10/15/2008 16:54 4,096 QUAR1.42803 10/15/2008 16:54 4,096 QUAR1.42851 10/15/2008 16:54 101,376 QUAR1.43852 10/15/2008 16:54 4,096 QUAR1.43972 08/16/2008 23:07 111,596 QUAR1.44398 10/15/2008 16:54 4,096 QUAR1.45747 10/15/2008 16:54 1,120 QUAR1.46483 10/15/2008 16:54 94,720 QUAR1.47301 10/15/2008 16:54 5,991 QUAR1.48016 10/15/2008 16:54 6,580 QUAR1.48087 10/15/2008 16:54 4,096 QUAR1.48557 10/15/2008 16:54 6,144 QUAR1.53144 10/15/2008 16:54 69,632 QUAR1.53304 10/15/2008 16:54 4,096 QUAR1.53434 10/15/2008 16:54 19,890 QUAR1.53738 10/15/2008 16:54 4,096 QUAR1.55293 10/15/2008 16:54 4,096 QUAR1.55521 10/15/2008 16:54 77,824 QUAR1.56161 10/15/2008 16:54 4,096 QUAR1.56247 10/15/2008 16:54 9,728 QUAR1.56449 10/15/2008 16:54 4,096 QUAR1.56666 10/15/2008 16:55 284 QUAR1.56909 10/15/2008 16:54 4,096 QUAR1.57363 10/15/2008 16:54 4,096 QUAR1.57536 10/15/2008 16:54 4,096 QUAR1.59904 10/15/2008 16:54 4,096 QUAR1.60780 10/15/2008 16:54 4,096 QUAR1.61996 10/15/2008 16:54 120,832 QUAR1.62762 10/15/2008 16:54 14,848 QUAR1.63575 10/15/2008 16:54 225,280 QUAR1.63621 08/16/2008 23:07 927,660 QUAR1.63872 10/15/2008 16:54 4,096 QUAR1.64158 10/15/2008 16:54 4,096 QUAR1.64280 10/15/2008 16:54 4,096 QUAR1.64671 10/15/2008 16:54 4,096 QUAR1.64737 10/15/2008 16:54 61,440 QUAR1.65203 10/15/2008 16:54 933,643 QUAR1.65543 08/16/2008 23:07 126,976 QUAR1.65846 10/15/2008 16:54 4,096 QUAR1.66088 10/02/2008 18:46 25,088 QUAR1.66547 10/15/2008 16:54 4,096 QUAR1.66699 10/15/2008 16:54 244,224 QUAR1.66961 10/15/2008 16:54 4,096 QUAR1.67996 08/16/2008 23:07 93 QUAR1.68057 10/15/2008 16:54 1,431,040 QUAR1.70867 10/15/2008 16:54 4,096 QUAR1.70982 10/15/2008 16:54 4,096 QUAR1.71680 10/02/2008 18:46 420,352 QUAR1.72132 10/15/2008 16:54 4,096 QUAR1.72634 10/02/2008 18:46 927,493 QUAR1.72735 10/15/2008 16:54 4,096 QUAR1.72803 10/15/2008 16:54 40,448 QUAR1.73951 10/15/2008 16:55 284 QUAR1.74141 10/15/2008 16:54 4,096 QUAR1.74215 10/15/2008 16:54 125 QUAR1.75288 08/16/2008 23:07 8,242 QUAR1.75425 08/16/2008 23:07 2,358 QUAR1.75574 10/02/2008 18:46 37,760 QUAR1.76113 10/15/2008 16:54 4,096 QUAR1.77210 10/15/2008 16:54 68,096 QUAR1.78510 10/15/2008 16:54 101,376 QUAR1.78830 10/02/2008 18:46 80,512 QUAR1.78856 10/15/2008 16:55 284 QUAR1.80334 10/15/2008 16:54 4,096 QUAR1.80964 10/15/2008 16:54 4,096 QUAR1.82746 10/15/2008 16:54 4,096 QUAR1.83195 08/16/2008 23:07 3,262 QUAR1.83256 10/15/2008 16:54 1,112 QUAR1.83829 10/15/2008 16:54 1,578 QUAR1.85352 08/16/2008 23:07 297 QUAR1.85490 10/15/2008 16:54 4,096 QUAR1.86076 10/15/2008 16:54 244,160 QUAR1.86185 10/15/2008 16:54 1,353,722 QUAR1.86222 10/15/2008 16:54 4,096 QUAR1.87706 10/15/2008 16:54 27,648 QUAR1.88477 10/15/2008 16:54 4,096 QUAR1.88709 10/15/2008 16:54 4,096 QUAR1.89425 10/15/2008 16:54 101,376 QUAR1.89572 08/16/2008 23:07 2,622 QUAR1.89969 10/15/2008 16:55 100 QUAR1.89991 10/15/2008 16:54 4,096 QUAR1.90266 10/15/2008 16:54 1,431,040 QUAR1.90358 10/02/2008 18:46 37,760 QUAR1.92498 10/15/2008 16:54 4,096 QUAR1.92797 10/15/2008 16:54 4,096 QUAR1.94332 10/15/2008 16:54 40,448 QUAR1.94822 10/15/2008 16:54 364,544 QUAR1.94871 10/15/2008 16:54 4,096 QUAR1.94951 10/15/2008 16:54 4,096 QUAR1.95656 10/15/2008 16:55 284 QUAR1.96795 10/02/2008 18:46 270,336 QUAR1.97374 10/15/2008 16:55 9,728 QUAR1.97391 10/02/2008 18:46 143 QUAR1.97567 10/15/2008 16:54 4,096 QUAR1.97873 10/15/2008 16:54 184,320 QUAR1.99371 10/02/2008 18:46 937,721 QUAR1.99827 10/15/2008 16:54 4,096 QUAR1.99881 10/15/2008 16:54 666 QUAR3.11554 10/15/2008 16:55 500 QUAR3.11654 10/15/2008 16:54 194 QUAR3.12639 10/15/2008 16:55 536 QUAR3.13033 10/02/2008 18:46 220 QUAR3.13120 10/15/2008 16:54 509 QUAR3.13148 10/15/2008 16:54 64 QUAR3.13823 10/15/2008 16:54 81 QUAR3.13858 10/02/2008 18:46 229 QUAR3.13910 10/02/2008 18:46 149 QUAR3.14694 10/15/2008 16:55 210 QUAR3.15250 10/15/2008 16:54 80 QUAR3.16355 10/15/2008 16:54 148 QUAR3.17117 10/15/2008 16:54 112 QUAR3.17792 10/15/2008 16:54 500 QUAR3.20723 10/15/2008 16:54 96 QUAR3.21536 10/15/2008 16:54 194 QUAR3.22136 10/15/2008 16:55 149 QUAR3.22530 10/02/2008 18:46 194 QUAR3.22554 10/15/2008 16:54 220 QUAR3.24637 10/15/2008 16:54 80 QUAR3.24741 10/15/2008 16:54 590 QUAR3.24750 10/15/2008 16:54 178 QUAR3.26093 10/15/2008 16:54 80 QUAR3.27169 08/16/2008 23:07 103 QUAR3.28354 10/15/2008 16:54 148 QUAR3.28773 10/15/2008 16:54 194 QUAR3.29734 10/15/2008 16:54 1,070 QUAR3.30157 10/15/2008 16:54 61 QUAR3.32092 10/15/2008 16:54 148 QUAR3.32764 10/15/2008 16:54 194 QUAR3.34238 10/15/2008 16:54 227 QUAR3.35002 08/16/2008 23:07 64 QUAR3.35584 10/15/2008 16:54 80 QUAR3.35761 10/15/2008 16:54 104 QUAR3.36815 10/15/2008 16:54 164 QUAR3.38068 10/15/2008 16:54 194 QUAR3.38776 10/15/2008 16:54 58 QUAR3.42232 08/16/2008 23:07 125 QUAR3.42262 10/02/2008 18:46 61 QUAR3.44449 10/15/2008 16:54 75 QUAR3.44572 10/02/2008 18:46 339 QUAR3.44827 10/15/2008 16:54 80 QUAR3.46408 10/15/2008 16:54 194 QUAR3.48602 10/02/2008 18:46 64 QUAR3.50086 10/15/2008 16:55 160 QUAR3.51771 10/15/2008 16:54 80 QUAR3.52088 10/15/2008 16:54 194 QUAR3.52634 10/15/2008 16:54 101 QUAR3.53310 10/15/2008 16:55 238 QUAR3.55115 10/15/2008 16:54 194 QUAR3.56276 10/15/2008 16:54 68 QUAR3.57519 10/15/2008 16:55 641 QUAR3.59392 10/15/2008 16:54 194 QUAR3.63435 10/15/2008 16:54 194 QUAR3.65741 08/16/2008 23:07 61 QUAR3.66595 10/15/2008 16:54 80 QUAR3.66618 10/15/2008 16:54 149 QUAR3.67148 10/15/2008 16:54 194 QUAR3.68247 10/15/2008 16:54 194 QUAR3.69107 10/15/2008 16:54 129 QUAR3.69172 10/15/2008 16:54 135 QUAR3.69711 10/15/2008 16:54 194 QUAR3.70882 08/16/2008 23:07 176 QUAR3.70907 10/15/2008 16:54 194 QUAR3.76079 10/15/2008 16:54 194 QUAR3.77261 10/15/2008 16:54 277 QUAR3.78049 10/15/2008 16:54 229 QUAR3.78718 10/15/2008 16:55 507 QUAR3.79507 10/15/2008 16:54 126 QUAR3.80256 10/15/2008 16:54 194 QUAR3.81507 10/15/2008 16:54 502 QUAR3.82128 10/15/2008 16:54 101 QUAR3.82210 10/15/2008 16:55 160 QUAR3.82894 10/15/2008 16:54 250 QUAR3.83735 08/16/2008 23:07 232 QUAR3.83866 10/15/2008 16:54 72 QUAR3.84598 10/15/2008 16:54 148 QUAR3.84633 10/15/2008 16:54 194 QUAR3.84774 10/15/2008 16:54 534 QUAR3.85065 10/15/2008 16:54 53 QUAR3.85618 10/15/2008 16:54 183 QUAR3.86476 10/15/2008 16:54 194 QUAR3.86554 10/15/2008 16:54 53 QUAR3.86886 10/15/2008 16:54 194 QUAR3.89319 10/15/2008 16:54 229 QUAR3.90994 10/02/2008 18:46 149 QUAR3.92843 10/15/2008 16:54 637 QUAR3.93843 10/15/2008 16:55 210 QUAR3.94325 10/15/2008 16:54 80 QUAR3.94863 10/02/2008 18:46 229 QUAR3.95028 10/15/2008 16:54 69 QUAR3.95101 10/15/2008 16:54 80 QUAR3.99158 492 File(s) 15,685,361 bytes 2 Dir(s) 9,998,794,752 bytes free
  2. You need this for every file in the quarantine folder? That's gonna take a while.
  3. The quarantine has 194 files and the back up has 210 files. (I hope I counted right)
  4. Well the scan was done on the 15th. Here are screen shots of the folder. Thanks man. I appreciate this. http://img.photobucket.com/albums/v401/mrpapasmurf/One.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Two.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Three.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Four.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Five.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Six.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Seven.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Eight.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Nine.jpg http://img.photobucket.com/albums/v401/mrpapasmurf/Ten.jpg
  5. I appreciate the help that you are doing, but our tax returns for last year is one of the files that was erased. I can't just give out that info. Sorry. Is there any way I could check the files in the quarantine folder myself??
  6. My wife's account is password protected. She is also a Admin, not a limited user. I do have system restore enabled and it was not turned off. I can go back to the day before the infection. But when I do the files are still not there.
  7. New to this place and I hope I can get some help. Last week I got hit with spyware/malware and I ran malwarebytes, well it worked PERFECTLY!! All except for a couple things. My wife and I both have different profiles on our computer, thing is I was on mine (she was not logged in) and malwarebytes flagged some of her documents/files for deletion. Is there any way for me to get these back?? I've checked the quarintine tab and they are not in there. The ones I'm looking for are in red. Thanks for any help, good or bad. Malwarebytes' Anti-Malware 1.28 Database version: 1272 Windows 5.1.2600 Service Pack 3 10/15/2008 4:55:34 PM mbam-log-2008-10-15 (16-55-33).txt Scan type: Full Scan (C:\|D:\|) Objects scanned: 154063 Time elapsed: 1 hour(s), 46 minute(s), 24 second(s) Memory Processes Infected: 0 Memory Modules Infected: 10 Registry Keys Infected: 78 Registry Values Infected: 6 Registry Data Items Infected: 17 Folders Infected: 9 Files Infected: 170 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: C:\WINDOWS\system32\efcCvTkj.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\iqmfqbqp.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\nvrsol32.dll (Spyware.Passwords) -> Delete on reboot. C:\WINDOWS\system32\slfbgwks.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\ogruuo.dll (Trojan.Vundo) -> Delete on reboot. C:\Program Files\altcmd\altcmd32.dll (Trojan.Agent) -> Delete on reboot. C:\WINDOWS\rosqxvmn.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\qrbgltos.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\ngwstxfd.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\grfxbanoxvd.dll (Trojan.FakeAlert) -> Delete on reboot. Registry Keys Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bc6a2d5b-bb8e-416a-ac92-b53be4b96746} (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{bc6a2d5b-bb8e-416a-ac92-b53be4b96746} (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{ecf26299-65c1-4735-9d95-832385abc630} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{78896b19-f11b-4bab-8e73-64e1741a1b27} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xxyxvnmm (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{0b682cc1-fb40-4006-a5dd-99edd3c9095d} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{54645654-2225-4455-44a1-9f4543d34545} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{5c7f15e1-f31a-44fd-aa1a-2ec63aaffd3a} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{f56d84dd-82ca-eb10-792f-20cf93037724} (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{967a494a-6aec-4555-9caf-fa6eb00acf91} (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{9692be2f-eb8f-49d9-a11c-c24c1ef734d5} (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{89a4b250-3412-4f9f-1ba9-8bbfa5f61670} (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\altcompare (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\dpcproxy (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Classes\hol5_vxiewer.full.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Classes\applications\accessdiver.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mslagent (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Invictus (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Golden Palace Casino PT (Trojan.DNSChanger) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Golden Palace Casino NEW (Trojan.DNSChanger) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\iTunesMusic (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\rdriv (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{d62978e4-f665-46c6-976f-87c02798ec8d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{4f0e986e-bd88-42f9-9a18-f83f2f08b379} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{20d5f8af-9fc4-494a-bf76-297ec26b4f06} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{5a1cdb35-0e44-467d-848e-75eee6a3631d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{7fd1ebf6-4940-49b8-8ea3-ab4e8c1bb127} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{a3b08abe-603c-4f4e-931c-a656d3e7c62e} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{ad2b9543-7af6-45d7-8423-0c104078aa2c} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{eeaeb652-21dd-4dc2-9615-b22f8eaaff62} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{1384bbed-92f5-410a-99dd-783a6f1f6ec0} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{3347ea96-b3d1-4b21-91c2-783bf6ab14e7} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{3691ff02-84ad-4b6c-bf3b-958c40e07a79} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{3b707e50-aab8-4efc-b725-678bcf520608} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{3e10f0f0-c634-4d6e-930a-2e963c41a9fb} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{42607666-409a-4b60-9fd3-ed185b8c6270} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{5487b53d-a8b4-43cd-a0cd-aa14888ab953} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{6a0e7e18-cae4-4cc0-89ce-d9dadd8e1e6c} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{8d040a20-d61f-45fe-9fec-309ac9d7b747} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{a34df596-b2bd-4fce-8eb8-2a0e12f9c33a} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{aac16432-7890-467f-9e23-2c4839583f0c} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{c8dc1405-ff68-4b03-b89d-ee8bebde981f} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{cb23e4ac-0230-4e3e-8e6e-a903764d63c9} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{f413a487-166b-461b-84e9-8e7c5bd57b48} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{a26c3416-dc23-443c-8882-ebacb7dc0d0f} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{20d8caf9-77ba-4e6c-b66f-fb9525e31f76} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{e41bdd46-19c8-44c2-8916-f3b9358ea708} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{4522268d-c6bf-40f3-86a4-bb60ad2ae473} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4522268d-c6bf-40f3-86a4-bb60ad2ae473} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\dkwqgnbe.bbtw (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\dkwqgnbe.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\rosqxvmn.bmex (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\rosqxvmn.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\00d4uqgzvu (Trojan.FakeAlert.H) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\xnpinit_dlls (Spyware.Agent.H) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{78896b19-f11b-4bab-8e73-64e1741a1b27} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\Components\0\source (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{20d5f8af-9fc4-494a-bf76-297ec26b4f06} (Trojan.FakeAlert) -> Quarantined and deleted successfully. Registry Data Items Infected: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\efccvtkj -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\scrfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("%1" %*) Good: ("%1" /S) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\efccvtkj -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76487-OEM-0011903-00825) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (h:mm:ss tt) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispCPL (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. Folders Infected: C:\WINDOWS\privacy_danger (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\privacy_danger\images (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Program Files\akl (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\system32\append.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\xlib254.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\Program Files\altcmd (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\smp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. Files Infected: C:\WINDOWS\system32\efcCvTkj.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\jkTvCcfe.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\jkTvCcfe.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\iqmfqbqp.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\pqbqfmqi.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Application Data\olkvexuh\oxajwxwp.exe (Trojan.FakeAlert.H) -> Delete on reboot. C:\WINDOWS\system32\nvrsol32.dll (Spyware.Agent.H) -> Delete on reboot. C:\WINDOWS\system32\slfbgwks.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\ogruuo.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\xxyxVnmM.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\gfrvb.exe (Trojan.Dropper) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temp\pwrmgr.exe (Rogue.Installer) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temp\cbkabgop.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\cntr[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\upd105320[2] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\buerrbspcd[1].htm (Trojan.Downloader) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\H3EAJL5P\vc[1].jpg (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\H3EAJL5P\svbur[1].htm (Trojan.Dropper) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\lx[1].jpg (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\sa2009[1].exe (Rogue.Installer) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\file[1].exe (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\system32\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\system32\xxyyvUlj.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\rqRJArQH.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\paso.el (Trojan.Dropper) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ssqNFYst.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\drivers\d6ce6521.sys (Rootkit.Agent) -> Delete on reboot. C:\WINDOWS\privacy_danger\index.htm (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\privacy_danger\images\body.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\privacy_danger\images\capt.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\privacy_danger\images\capt2.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\privacy_danger\images\red.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\privacy_danger\images\text.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\mslagent\2_mslagent.dll (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\WINDOWS\mslagent\mslagent.exe (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\WINDOWS\mslagent\uninstall.exe (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\altcmd\altcmd.inf (Trojan.Agent) -> Quarantined and deleted successfully. C:\Program Files\altcmd\altcmd32.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\Program Files\altcmd\uninstall.bat (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\smp\msrc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Application Data\Adobe\Player.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\a.bat (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\base64.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\winsystem.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\zip1.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\zip2.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\zip3.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\zipped.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\WINDOWS\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\iTunesMusic.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\akttzn.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\anticipator.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\awtoolb.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\bsva-egihsg52.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\dpcproxy.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\emesx.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\h@tkeysh@@k.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\hoproxy.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\hxiwlgpm.dat (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\hxiwlgpm.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\medup012.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\medup020.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\msgp.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\msnbho.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\msvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\mtr2.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\mwin32.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\netode.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\newsd32.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ps1.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\psof1.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\psoft1.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\regc64.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\regm64.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\Rundl1.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\sncntr.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ssurf022.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ssvchost.com (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ssvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\sysreq.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\taack.dat (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\taack.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\temp#01.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\thun.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\thun32.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\VBIEWER.OCX (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\vcatchpi.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\winlogonpc.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\winsystem.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\WINWGPX.EXE (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\drivers\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully. C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully. C:\WINDOWS\system32\vbsys2.dll (Trojan.Clicker) -> Quarantined and deleted successfully. C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\rosqxvmn.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\qrbgltos.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\ngwstxfd.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\lomxeqsn.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\grfxbanoxvd.dll (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\system32\brastk.exe (Trojan.FakeAlert) -> Delete on reboot. C:\WINDOWS\system32\wini104552664.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Desktop\Protect Your Privacy.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Desktop\Malware Defender.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Desktop\System Error Fixer.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Favorites\Malware Defender.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Favorites\Protect Your Privacy.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Favorites\System Error Fixer.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Jesse M\Application Data\temp.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\~WRD0000.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\~WRD0001.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\14d3_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\187d_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\21f5_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\322a_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\323b_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\32ed_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\3990_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\3d0e_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\446_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\4b6c_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\596b_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\6084_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\6af_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\6bf_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\6d99_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\7d64_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\7f1e_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\7f3f_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\8a89_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\8d85_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\92f_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\9466_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\9fd3_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\a12a_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\b008_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\bad6_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\c160_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\d859_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\f0e2_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\Microsoft Office 2003 Setup(0001).txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Local Settings\Temp\Microsoft Office 2003 Setup(0001)_Task(0001).txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\LauraGraciela[1].rtf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\Laura_Graciela.rtf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\2007 Mirabal J & L jointTax Return.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\2007 Ramos L marriedsep Tax Return.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\2007 Ramos L single Tax Return.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\Wedding_Budget.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\Wedding_Checklist.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\13_White%20calla%20lily%20with%201%20petail.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\749px-Calla_lily.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\AlbumArt_{268F5B23-B0FB-44F2-B7D2-9752EF2E84EE}_Large.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\AlbumArt_{268F5B23-B0FB-44F2-B7D2-9752EF2E84EE}_Small.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\Drink Recipes.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\favortin_85rectangulartemplate.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\favortin_85roundtemplate.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully. C:\Documents and Settings\Laura\Desktop\Loan 1 & 2.xls (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.