Jump to content

Are these lost forever????


Recommended Posts

New to this place and I hope I can get some help. Last week I got hit with spyware/malware and I ran malwarebytes, well it worked PERFECTLY!! All except for a couple things. My wife and I both have different profiles on our computer, thing is I was on mine (she was not logged in) and malwarebytes flagged some of her documents/files for deletion. Is there any way for me to get these back?? I've checked the quarintine tab and they are not in there. The ones I'm looking for are in red. Thanks for any help, good or bad.

Malwarebytes' Anti-Malware 1.28

Database version: 1272

Windows 5.1.2600 Service Pack 3

10/15/2008 4:55:34 PM

mbam-log-2008-10-15 (16-55-33).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 154063

Time elapsed: 1 hour(s), 46 minute(s), 24 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 10

Registry Keys Infected: 78

Registry Values Infected: 6

Registry Data Items Infected: 17

Folders Infected: 9

Files Infected: 170

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

C:\WINDOWS\system32\efcCvTkj.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\iqmfqbqp.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\nvrsol32.dll (Spyware.Passwords) -> Delete on reboot.

C:\WINDOWS\system32\slfbgwks.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\ogruuo.dll (Trojan.Vundo) -> Delete on reboot.

C:\Program Files\altcmd\altcmd32.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\rosqxvmn.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\qrbgltos.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\ngwstxfd.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\grfxbanoxvd.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bc6a2d5b-bb8e-416a-ac92-b53be4b96746} (Trojan.Vundo.H) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{bc6a2d5b-bb8e-416a-ac92-b53be4b96746} (Trojan.Vundo.H) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{ecf26299-65c1-4735-9d95-832385abc630} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{78896b19-f11b-4bab-8e73-64e1741a1b27} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xxyxvnmm (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{0b682cc1-fb40-4006-a5dd-99edd3c9095d} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{54645654-2225-4455-44a1-9f4543d34545} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{5c7f15e1-f31a-44fd-aa1a-2ec63aaffd3a} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\TypeLib\{f56d84dd-82ca-eb10-792f-20cf93037724} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{967a494a-6aec-4555-9caf-fa6eb00acf91} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{9692be2f-eb8f-49d9-a11c-c24c1ef734d5} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{89a4b250-3412-4f9f-1ba9-8bbfa5f61670} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\altcompare (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\dpcproxy (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Classes\hol5_vxiewer.full.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Classes\applications\accessdiver.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mslagent (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Invictus (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Golden Palace Casino PT (Trojan.DNSChanger) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Golden Palace Casino NEW (Trojan.DNSChanger) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\iTunesMusic (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\rdriv (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\TypeLib\{d62978e4-f665-46c6-976f-87c02798ec8d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{4f0e986e-bd88-42f9-9a18-f83f2f08b379} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{20d5f8af-9fc4-494a-bf76-297ec26b4f06} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{5a1cdb35-0e44-467d-848e-75eee6a3631d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{7fd1ebf6-4940-49b8-8ea3-ab4e8c1bb127} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{a3b08abe-603c-4f4e-931c-a656d3e7c62e} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{ad2b9543-7af6-45d7-8423-0c104078aa2c} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{eeaeb652-21dd-4dc2-9615-b22f8eaaff62} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{1384bbed-92f5-410a-99dd-783a6f1f6ec0} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{3347ea96-b3d1-4b21-91c2-783bf6ab14e7} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{3691ff02-84ad-4b6c-bf3b-958c40e07a79} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{3b707e50-aab8-4efc-b725-678bcf520608} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{3e10f0f0-c634-4d6e-930a-2e963c41a9fb} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{42607666-409a-4b60-9fd3-ed185b8c6270} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{5487b53d-a8b4-43cd-a0cd-aa14888ab953} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{6a0e7e18-cae4-4cc0-89ce-d9dadd8e1e6c} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{8d040a20-d61f-45fe-9fec-309ac9d7b747} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{a34df596-b2bd-4fce-8eb8-2a0e12f9c33a} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{aac16432-7890-467f-9e23-2c4839583f0c} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{c8dc1405-ff68-4b03-b89d-ee8bebde981f} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{cb23e4ac-0230-4e3e-8e6e-a903764d63c9} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{f413a487-166b-461b-84e9-8e7c5bd57b48} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\TypeLib\{a26c3416-dc23-443c-8882-ebacb7dc0d0f} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{20d8caf9-77ba-4e6c-b66f-fb9525e31f76} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{e41bdd46-19c8-44c2-8916-f3b9358ea708} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{4522268d-c6bf-40f3-86a4-bb60ad2ae473} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4522268d-c6bf-40f3-86a4-bb60ad2ae473} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\dkwqgnbe.bbtw (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\dkwqgnbe.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\rosqxvmn.bmex (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\rosqxvmn.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\00d4uqgzvu (Trojan.FakeAlert.H) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\xnpinit_dlls (Spyware.Agent.H) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{78896b19-f11b-4bab-8e73-64e1741a1b27} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\Components\0\source (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{20d5f8af-9fc4-494a-bf76-297ec26b4f06} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\efccvtkj -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\scrfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("%1" %*) Good: ("%1" /S) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\efccvtkj -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76487-OEM-0011903-00825) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (h:mm:ss tt) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispCPL (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:

C:\WINDOWS\privacy_danger (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\akl (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\append.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\xlib254.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Program Files\altcmd (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\smp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

Files Infected:

C:\WINDOWS\system32\efcCvTkj.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\jkTvCcfe.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jkTvCcfe.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\iqmfqbqp.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\pqbqfmqi.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\olkvexuh\oxajwxwp.exe (Trojan.FakeAlert.H) -> Delete on reboot.

C:\WINDOWS\system32\nvrsol32.dll (Spyware.Agent.H) -> Delete on reboot.

C:\WINDOWS\system32\slfbgwks.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\ogruuo.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\xxyxVnmM.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\gfrvb.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temp\pwrmgr.exe (Rogue.Installer) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temp\cbkabgop.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\cntr[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\upd105320[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\959AGX5I\buerrbspcd[1].htm (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\H3EAJL5P\vc[1].jpg (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\H3EAJL5P\svbur[1].htm (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\lx[1].jpg (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\sa2009[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Local Settings\Temporary Internet Files\Content.IE5\WDO4RX8A\file[1].exe (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\xxyyvUlj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\rqRJArQH.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\paso.el (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssqNFYst.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\drivers\d6ce6521.sys (Rootkit.Agent) -> Delete on reboot.

C:\WINDOWS\privacy_danger\index.htm (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\body.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\capt.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\capt2.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\red.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\text.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\2_mslagent.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\mslagent.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\uninstall.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\altcmd\altcmd.inf (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Program Files\altcmd\altcmd32.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Program Files\altcmd\uninstall.bat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\smp\msrc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Application Data\Adobe\Player.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\a.bat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\base64.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\winsystem.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip1.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip2.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip3.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zipped.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\iTunesMusic.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\akttzn.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\anticipator.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\awtoolb.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bsva-egihsg52.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\dpcproxy.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\emesx.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\h@tkeysh@@k.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hoproxy.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hxiwlgpm.dat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hxiwlgpm.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\medup012.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\medup020.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msgp.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msnbho.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mtr2.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mwin32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\netode.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\newsd32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ps1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\psof1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\psoft1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\regc64.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\regm64.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\Rundl1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sncntr.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssurf022.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssvchost.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sysreq.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\taack.dat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\taack.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\temp#01.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\thun.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\thun32.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\VBIEWER.OCX (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vcatchpi.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\winlogonpc.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\winsystem.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\WINWGPX.EXE (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\drivers\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vbsys2.dll (Trojan.Clicker) -> Quarantined and deleted successfully.

C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\rosqxvmn.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\qrbgltos.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\ngwstxfd.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\lomxeqsn.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\grfxbanoxvd.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\system32\brastk.exe (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\system32\wini104552664.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Desktop\Protect Your Privacy.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Desktop\Malware Defender.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Desktop\System Error Fixer.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Favorites\Malware Defender.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Favorites\Protect Your Privacy.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Favorites\System Error Fixer.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Jesse M\Application Data\temp.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\~WRD0000.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\~WRD0001.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\14d3_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\187d_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\21f5_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\322a_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\323b_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\32ed_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\3990_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\3d0e_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\446_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\4b6c_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\596b_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\6084_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\6af_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\6bf_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\6d99_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\7d64_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\7f1e_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\7f3f_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\8a89_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\8d85_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\92f_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\9466_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\9fd3_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\a12a_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\b008_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\bad6_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\c160_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\d859_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\f0e2_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\Microsoft Office 2003 Setup(0001).txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Local Settings\Temp\Microsoft Office 2003 Setup(0001)_Task(0001).txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\LauraGraciela[1].rtf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\Laura_Graciela.rtf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\2007 Mirabal J & L jointTax Return.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\2007 Ramos L marriedsep Tax Return.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\2007 Ramos L single Tax Return.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\Wedding_Budget.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\Wedding_Checklist.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\13_White%20calla%20lily%20with%201%20petail.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\749px-Calla_lily.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\AlbumArt_{268F5B23-B0FB-44F2-B7D2-9752EF2E84EE}_Large.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\AlbumArt_{268F5B23-B0FB-44F2-B7D2-9752EF2E84EE}_Small.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\Drink Recipes.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\favortin_85rectangulartemplate.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\favortin_85roundtemplate.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

C:\Documents and Settings\Laura\Desktop\Loan 1 & 2.xls (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Hello Sir.

Are either of the accounts password protected?

And is your wifes by chance a limited user account?

Do you have system restore enabled?

If so, has it been turned off since you were infected?

If you move a file to quarantine, and then you empty the quarantine, short of an operating system restore with a good restore point prior to this, AND the file matching various criteria, it's really gone at that point.

I will monitor this post for replies, and do my best to assist you.

Link to post
Share on other sites

My wife's account is password protected. She is also a Admin, not a limited user. I do have system restore enabled and it was not turned off. I can go back to the day before the infection. But when I do the files are still not there.

Okay. You haven't emptied the quarantine folder since this took place right?

If you have not, please zip up the folder and send it to uploads.malwarebytes.org so that we can try to recover those files if they are present inside of it. The quarantine folder is under the user profile you used to scan with, Application Data/MalwareBytes/Malwarebytes antimalware/quarantine.

I will see what I can do for you.

Link to post
Share on other sites

Okay. You haven't emptied the quarantine folder since this took place right?

If you have not, please zip up the folder and send it to uploads.malwarebytes.org so that we can try to recover those files if they are present inside of it. The quarantine folder is under the user profile you used to scan with, Application Data/MalwareBytes/Malwarebytes antimalware/quarantine.

I will see what I can do for you.

I appreciate the help that you are doing, but our tax returns for last year is one of the files that was erased. I can't just give out that info. Sorry. Is there any way I could check the files in the quarantine folder myself??

Link to post
Share on other sites

I appreciate the help that you are doing, but our tax returns for last year is one of the files that was erased. I can't just give out that info. Sorry. Is there any way I could check the files in the quarantine folder myself??

The files in the quarantine folder are encrypted... Can you provide me a screen capture of the quarantine list?

While you certainly could browse the folder if you wanted, it wouldn't do you much good.

Regarding windows system restore, evidently, it doesn't actually backup documents and things on your desktop, just shortcuts to them. :)

Would you be able to provide a directory text listing of the contents of the quarantine folder? One such way of doing this is like so:

open a console prompt, start>run>cmd.exe

After each command below, press enter. Don't type <enter> just press the button. :)

cd %appdata% <enter>

cd malwarebytes <enter>

cd malwarebytes' antimalware <enter>

cd quarantine <enter>

dir *.* /a >info.txt <enter>

notepad info.txt <enter>

copy and paste the contents from notepad to your reply.

Alternatively, instead of typing all those directory names out by hand, you can hit your tab key in the console prompt until it picks the folder you want. :)

Link to post
Share on other sites

Link to post
Share on other sites

Well the scan was done on the 15th. Here are screen shots of the folder. Thanks man. I appreciate this.

Just to clarify, what I need to confirm is that the backup files and the quar files are the same.. ie, if it has 25 backup files, it should have 25 quar files.

So if you could tell me if the file amounts match, that would be very helpful. :)

Link to post
Share on other sites

Just to clarify, what I need to confirm is that the backup files and the quar files are the same.. ie, if it has 25 backup files, it should have 25 quar files.

So if you could tell me if the file amounts match, that would be very helpful. :)

The quarantine has 194 files and the back up has 210 files. (I hope I counted right)

Link to post
Share on other sites

Would you be able to provide a directory text listing of the contents of the quarantine folder? One such way of doing this is like so:

open a console prompt, start>run>cmd.exe

After each command below, press enter. Don't type <enter> just press the button. :)

cd %appdata% <enter>

cd malwarebytes <enter>

cd malwarebytes' antimalware <enter>

cd quarantine <enter>

dir *.* /a >info.txt <enter>

notepad info.txt <enter>

copy and paste the contents from notepad to your reply.

Alternatively, instead of typing all those directory names out by hand, you can hit your tab key in the console prompt until it picks the folder you want. :)

You need this for every file in the quarantine folder? That's gonna take a while.

Link to post
Share on other sites

You need this for every file in the quarantine folder? That's gonna take a while.

Erm, no. the dir command will put everything we need in the text file for you. It shouldn't take any real time.

Allow me to consult with the fellows and we'll see where to go from here, ok? In the mean time, do not empty your quarantine.

Link to post
Share on other sites

Sorry, I didn't follow directions properly :) Heres the log, I hope this helps.

Volume in drive C has no label.

Volume Serial Number is 006D-ABB4

Directory of C:\Documents and Settings\Jesse M\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine

10/22/2008 05:41 <DIR> .

10/22/2008 05:41 <DIR> ..

10/15/2008 16:54 80 BACKUP1.12401

10/15/2008 16:54 81 BACKUP1.13104

10/15/2008 16:54 76 BACKUP1.13596

10/15/2008 16:54 98 BACKUP1.13776

10/15/2008 16:54 73 BACKUP1.14138

08/16/2008 23:07 92 BACKUP1.15175

08/16/2008 23:07 76 BACKUP1.15637

10/02/2008 18:46 71 BACKUP1.16519

10/15/2008 16:54 78 BACKUP1.16964

10/15/2008 16:54 81 BACKUP1.17036

10/15/2008 16:54 82 BACKUP1.17402

10/15/2008 16:55 90 BACKUP1.18874

10/15/2008 16:54 80 BACKUP1.19862

10/15/2008 16:55 111 BACKUP1.19873

10/15/2008 16:54 86 BACKUP1.20437

10/15/2008 16:54 115 BACKUP1.21467

10/02/2008 18:46 155 BACKUP1.21808

10/15/2008 16:54 76 BACKUP1.22863

10/15/2008 16:54 155 BACKUP1.22990

10/02/2008 18:46 82 BACKUP1.23211

10/15/2008 16:54 78 BACKUP1.23343

10/15/2008 16:54 156 BACKUP1.23451

10/15/2008 16:54 76 BACKUP1.23963

10/15/2008 16:54 67 BACKUP1.26010

10/15/2008 16:54 76 BACKUP1.26221

10/15/2008 16:54 89 BACKUP1.26261

10/15/2008 16:54 81 BACKUP1.26549

10/02/2008 18:46 83 BACKUP1.27348

10/15/2008 16:54 81 BACKUP1.28958

10/02/2008 18:46 150 BACKUP1.29412

10/15/2008 16:54 83 BACKUP1.30374

10/15/2008 16:54 80 BACKUP1.31923

10/15/2008 16:54 158 BACKUP1.31947

10/15/2008 16:54 79 BACKUP1.32652

10/15/2008 16:54 79 BACKUP1.32802

10/15/2008 16:54 91 BACKUP1.32977

08/16/2008 23:07 89 BACKUP1.33561

10/02/2008 18:46 80 BACKUP1.33769

10/02/2008 18:46 80 BACKUP1.33979

10/02/2008 18:46 128 BACKUP1.34711

10/15/2008 16:54 83 BACKUP1.39026

10/15/2008 16:54 75 BACKUP1.39805

10/15/2008 16:54 79 BACKUP1.40874

10/15/2008 16:54 81 BACKUP1.41244

10/15/2008 16:55 109 BACKUP1.41382

10/15/2008 16:54 86 BACKUP1.41616

10/15/2008 16:54 94 BACKUP1.42213

10/15/2008 16:54 81 BACKUP1.42803

10/15/2008 16:54 84 BACKUP1.42851

10/15/2008 16:54 81 BACKUP1.43852

10/15/2008 16:54 81 BACKUP1.43972

08/16/2008 23:07 73 BACKUP1.44398

10/15/2008 16:54 89 BACKUP1.45747

10/15/2008 16:54 83 BACKUP1.46483

10/15/2008 16:54 63 BACKUP1.47301

10/15/2008 16:54 94 BACKUP1.48016

10/15/2008 16:54 95 BACKUP1.48087

10/15/2008 16:54 79 BACKUP1.48557

10/15/2008 16:54 82 BACKUP1.53144

10/15/2008 16:54 153 BACKUP1.53304

10/15/2008 16:54 85 BACKUP1.53434

10/15/2008 16:54 94 BACKUP1.53738

10/15/2008 16:54 70 BACKUP1.55293

10/15/2008 16:54 79 BACKUP1.55521

10/15/2008 16:54 157 BACKUP1.56161

10/15/2008 16:54 81 BACKUP1.56247

10/15/2008 16:54 74 BACKUP1.56449

10/15/2008 16:54 80 BACKUP1.56666

10/15/2008 16:55 111 BACKUP1.56909

10/15/2008 16:54 86 BACKUP1.57363

10/15/2008 16:54 84 BACKUP1.57536

10/15/2008 16:54 87 BACKUP1.59904

10/15/2008 16:54 78 BACKUP1.60780

10/15/2008 16:54 77 BACKUP1.61996

10/15/2008 16:54 166 BACKUP1.62762

10/15/2008 16:54 116 BACKUP1.63575

10/15/2008 16:54 76 BACKUP1.63621

08/16/2008 23:07 89 BACKUP1.63872

10/15/2008 16:54 81 BACKUP1.64158

10/15/2008 16:54 79 BACKUP1.64280

10/15/2008 16:54 81 BACKUP1.64671

10/15/2008 16:54 79 BACKUP1.64737

10/15/2008 16:54 129 BACKUP1.65203

10/15/2008 16:54 84 BACKUP1.65543

08/16/2008 23:07 70 BACKUP1.65846

10/15/2008 16:54 79 BACKUP1.66088

10/02/2008 18:46 56 BACKUP1.66547

10/15/2008 16:54 83 BACKUP1.66699

10/15/2008 16:54 83 BACKUP1.66961

10/15/2008 16:54 84 BACKUP1.67996

08/16/2008 23:07 89 BACKUP1.68057

10/15/2008 16:54 160 BACKUP1.70867

10/15/2008 16:54 85 BACKUP1.70982

10/15/2008 16:54 77 BACKUP1.71680

10/02/2008 18:46 119 BACKUP1.72132

10/15/2008 16:54 79 BACKUP1.72634

10/02/2008 18:46 82 BACKUP1.72735

10/15/2008 16:54 81 BACKUP1.72803

10/15/2008 16:54 81 BACKUP1.73951

10/15/2008 16:55 113 BACKUP1.74141

10/15/2008 16:54 85 BACKUP1.74215

10/15/2008 16:54 86 BACKUP1.75288

08/16/2008 23:07 89 BACKUP1.75425

08/16/2008 23:07 91 BACKUP1.75574

10/02/2008 18:46 80 BACKUP1.76113

10/15/2008 16:54 79 BACKUP1.77210

10/15/2008 16:54 156 BACKUP1.78510

10/15/2008 16:54 153 BACKUP1.78830

10/02/2008 18:46 82 BACKUP1.78856

10/15/2008 16:55 113 BACKUP1.80334

10/15/2008 16:54 81 BACKUP1.80964

10/15/2008 16:54 80 BACKUP1.82746

10/15/2008 16:54 81 BACKUP1.83195

08/16/2008 23:07 92 BACKUP1.83256

10/15/2008 16:54 93 BACKUP1.83829

10/15/2008 16:54 88 BACKUP1.85352

08/16/2008 23:07 89 BACKUP1.85490

10/15/2008 16:54 76 BACKUP1.86076

10/15/2008 16:54 151 BACKUP1.86185

10/15/2008 16:54 83 BACKUP1.86222

10/15/2008 16:54 81 BACKUP1.87706

10/15/2008 16:54 87 BACKUP1.88477

10/15/2008 16:54 98 BACKUP1.88709

10/15/2008 16:54 73 BACKUP1.89425

10/15/2008 16:54 79 BACKUP1.89572

08/16/2008 23:07 73 BACKUP1.89969

10/15/2008 16:55 108 BACKUP1.89991

10/15/2008 16:54 77 BACKUP1.90266

10/15/2008 16:54 116 BACKUP1.90358

10/02/2008 18:46 82 BACKUP1.92498

10/15/2008 16:54 79 BACKUP1.92797

10/15/2008 16:54 81 BACKUP1.94332

10/15/2008 16:54 81 BACKUP1.94822

10/15/2008 16:54 79 BACKUP1.94871

10/15/2008 16:54 78 BACKUP1.94951

10/15/2008 16:54 79 BACKUP1.95656

10/15/2008 16:55 115 BACKUP1.96795

10/02/2008 18:46 70 BACKUP1.97374

10/15/2008 16:55 83 BACKUP1.97391

10/02/2008 18:46 77 BACKUP1.97567

10/15/2008 16:54 78 BACKUP1.97873

10/15/2008 16:54 85 BACKUP1.99371

10/02/2008 18:46 82 BACKUP1.99827

10/15/2008 16:54 80 BACKUP1.99881

10/15/2008 16:54 74 BACKUP2.14809

08/16/2008 23:07 85 BACKUP2.53862

10/15/2008 16:54 82 BACKUP2.60104

10/15/2008 16:54 79 BACKUP2.64234

10/15/2008 16:54 82 BACKUP2.64641

10/15/2008 16:54 89 BACKUP2.68045

10/15/2008 16:54 80 BACKUP2.74093

10/15/2008 16:54 74 BACKUP2.91213

10/15/2008 16:54 87 BACKUP2.99269

10/15/2008 16:54 81 BACKUP2.99754

10/15/2008 16:54 119 BACKUP3.11554

10/15/2008 16:55 127 BACKUP3.11654

10/15/2008 16:54 123 BACKUP3.12639

10/15/2008 16:55 125 BACKUP3.13033

10/02/2008 18:46 146 BACKUP3.13120

10/15/2008 16:54 123 BACKUP3.13148

10/15/2008 16:54 103 BACKUP3.13823

10/15/2008 16:54 128 BACKUP3.13858

10/02/2008 18:46 120 BACKUP3.13910

10/02/2008 18:46 189 BACKUP3.14694

10/15/2008 16:55 92 BACKUP3.15250

10/15/2008 16:54 127 BACKUP3.16355

10/15/2008 16:54 195 BACKUP3.17117

10/15/2008 16:54 156 BACKUP3.17792

10/15/2008 16:54 127 BACKUP3.20723

10/15/2008 16:54 139 BACKUP3.21536

10/15/2008 16:54 123 BACKUP3.22136

10/15/2008 16:55 192 BACKUP3.22530

10/02/2008 18:46 117 BACKUP3.22554

10/15/2008 16:54 145 BACKUP3.24637

10/15/2008 16:54 127 BACKUP3.24741

10/15/2008 16:54 121 BACKUP3.24750

10/15/2008 16:54 140 BACKUP3.26093

10/15/2008 16:54 127 BACKUP3.27169

08/16/2008 23:07 102 BACKUP3.28354

10/15/2008 16:54 195 BACKUP3.28773

10/15/2008 16:54 123 BACKUP3.29734

10/15/2008 16:54 103 BACKUP3.30157

10/15/2008 16:54 100 BACKUP3.32092

10/15/2008 16:54 195 BACKUP3.32764

10/15/2008 16:54 123 BACKUP3.34238

10/15/2008 16:54 119 BACKUP3.35002

08/16/2008 23:07 102 BACKUP3.35584

10/15/2008 16:54 127 BACKUP3.35761

10/15/2008 16:54 98 BACKUP3.36815

10/15/2008 16:54 94 BACKUP3.38068

10/15/2008 16:54 123 BACKUP3.38776

10/15/2008 16:54 101 BACKUP3.42232

08/16/2008 23:07 99 BACKUP3.42262

10/02/2008 18:46 99 BACKUP3.44449

10/15/2008 16:54 122 BACKUP3.44572

10/02/2008 18:46 106 BACKUP3.44827

10/15/2008 16:54 127 BACKUP3.46408

10/15/2008 16:54 123 BACKUP3.48602

10/02/2008 18:46 102 BACKUP3.50086

10/15/2008 16:55 97 BACKUP3.51771

10/15/2008 16:54 127 BACKUP3.52088

10/15/2008 16:54 123 BACKUP3.52634

10/15/2008 16:54 92 BACKUP3.53310

10/15/2008 16:55 107 BACKUP3.55115

10/15/2008 16:54 123 BACKUP3.56276

10/15/2008 16:54 112 BACKUP3.57519

10/15/2008 16:55 123 BACKUP3.59392

10/15/2008 16:54 123 BACKUP3.63435

10/15/2008 16:54 123 BACKUP3.65741

08/16/2008 23:07 99 BACKUP3.66595

10/15/2008 16:54 127 BACKUP3.66618

10/15/2008 16:54 190 BACKUP3.67148

10/15/2008 16:54 123 BACKUP3.68247

10/15/2008 16:54 123 BACKUP3.69107

10/15/2008 16:54 150 BACKUP3.69172

10/15/2008 16:54 110 BACKUP3.69711

10/15/2008 16:54 123 BACKUP3.70882

08/16/2008 23:07 185 BACKUP3.70907

10/15/2008 16:54 123 BACKUP3.76079

10/15/2008 16:54 123 BACKUP3.77261

10/15/2008 16:54 138 BACKUP3.78049

10/15/2008 16:54 119 BACKUP3.78718

10/15/2008 16:55 127 BACKUP3.79507

10/15/2008 16:54 101 BACKUP3.80256

10/15/2008 16:54 123 BACKUP3.81507

10/15/2008 16:54 123 BACKUP3.82128

10/15/2008 16:54 144 BACKUP3.82210

10/15/2008 16:55 97 BACKUP3.82894

10/15/2008 16:54 124 BACKUP3.83735

08/16/2008 23:07 116 BACKUP3.83866

10/15/2008 16:54 115 BACKUP3.84598

10/15/2008 16:54 195 BACKUP3.84633

10/15/2008 16:54 123 BACKUP3.84774

10/15/2008 16:54 125 BACKUP3.85065

10/15/2008 16:54 100 BACKUP3.85618

10/15/2008 16:54 90 BACKUP3.86476

10/15/2008 16:54 123 BACKUP3.86554

10/15/2008 16:54 96 BACKUP3.86886

10/15/2008 16:54 123 BACKUP3.89319

10/15/2008 16:54 121 BACKUP3.90994

10/02/2008 18:46 189 BACKUP3.92843

10/15/2008 16:54 123 BACKUP3.93843

10/15/2008 16:55 92 BACKUP3.94325

10/15/2008 16:54 127 BACKUP3.94863

10/02/2008 18:46 120 BACKUP3.95028

10/15/2008 16:54 88 BACKUP3.95101

10/15/2008 16:54 127 BACKUP3.99158

10/15/2008 16:54 161 BACKUP4.14272

10/15/2008 16:54 239 BACKUP4.27667

10/15/2008 16:54 172 BACKUP4.28646

10/15/2008 16:54 197 BACKUP4.29715

10/15/2008 16:54 195 BACKUP4.45996

10/02/2008 18:46 191 BACKUP4.91769

10/15/2008 16:54 192 BACKUP4.96680

10/22/2008 17:08 0 info.txt

10/15/2008 16:54 4,096 QUAR1.12401

10/15/2008 16:54 42,496 QUAR1.13104

10/15/2008 16:54 4,096 QUAR1.13596

10/15/2008 16:54 4,096 QUAR1.13776

10/15/2008 16:54 6,144 QUAR1.14138

08/16/2008 23:07 3,262 QUAR1.15175

08/16/2008 23:07 131,584 QUAR1.15637

10/02/2008 18:46 94,208 QUAR1.16519

10/15/2008 16:54 4,096 QUAR1.16964

10/15/2008 16:54 4,096 QUAR1.17036

10/15/2008 16:54 4,096 QUAR1.17402

10/15/2008 16:55 717 QUAR1.18874

10/15/2008 16:54 4,096 QUAR1.19862

10/15/2008 16:55 284 QUAR1.19873

10/15/2008 16:54 4,096 QUAR1.20437

10/15/2008 16:54 36,216 QUAR1.21467

10/02/2008 18:46 80,512 QUAR1.21808

10/15/2008 16:54 266,240 QUAR1.22863

10/15/2008 16:54 54,272 QUAR1.22990

10/02/2008 18:46 326,656 QUAR1.23211

10/15/2008 16:54 94,720 QUAR1.23343

10/15/2008 16:54 36,216 QUAR1.23451

10/15/2008 16:54 86,016 QUAR1.23963

10/15/2008 16:54 4,096 QUAR1.26010

10/15/2008 16:54 212,992 QUAR1.26221

10/15/2008 16:54 4,096 QUAR1.26261

10/15/2008 16:54 42,496 QUAR1.26549

10/02/2008 18:46 927,493 QUAR1.27348

10/15/2008 16:54 4,096 QUAR1.28958

10/02/2008 18:46 326,592 QUAR1.29412

10/15/2008 16:54 933,821 QUAR1.30374

10/15/2008 16:54 4,096 QUAR1.31923

10/15/2008 16:54 94,720 QUAR1.31947

10/15/2008 16:54 4,096 QUAR1.32652

10/15/2008 16:54 4,096 QUAR1.32802

10/15/2008 16:54 4,096 QUAR1.32977

08/16/2008 23:07 6,746 QUAR1.33561

10/02/2008 18:46 37,760 QUAR1.33769

10/02/2008 18:46 37,760 QUAR1.33979

10/02/2008 18:46 88,576 QUAR1.34711

10/15/2008 16:54 68,096 QUAR1.39026

10/15/2008 16:54 4,096 QUAR1.39805

10/15/2008 16:54 4,096 QUAR1.40874

10/15/2008 16:54 4,096 QUAR1.41244

10/15/2008 16:55 284 QUAR1.41382

10/15/2008 16:54 27,648 QUAR1.41616

10/15/2008 16:54 13,309 QUAR1.42213

10/15/2008 16:54 4,096 QUAR1.42803

10/15/2008 16:54 4,096 QUAR1.42851

10/15/2008 16:54 101,376 QUAR1.43852

10/15/2008 16:54 4,096 QUAR1.43972

08/16/2008 23:07 111,596 QUAR1.44398

10/15/2008 16:54 4,096 QUAR1.45747

10/15/2008 16:54 1,120 QUAR1.46483

10/15/2008 16:54 94,720 QUAR1.47301

10/15/2008 16:54 5,991 QUAR1.48016

10/15/2008 16:54 6,580 QUAR1.48087

10/15/2008 16:54 4,096 QUAR1.48557

10/15/2008 16:54 6,144 QUAR1.53144

10/15/2008 16:54 69,632 QUAR1.53304

10/15/2008 16:54 4,096 QUAR1.53434

10/15/2008 16:54 19,890 QUAR1.53738

10/15/2008 16:54 4,096 QUAR1.55293

10/15/2008 16:54 4,096 QUAR1.55521

10/15/2008 16:54 77,824 QUAR1.56161

10/15/2008 16:54 4,096 QUAR1.56247

10/15/2008 16:54 9,728 QUAR1.56449

10/15/2008 16:54 4,096 QUAR1.56666

10/15/2008 16:55 284 QUAR1.56909

10/15/2008 16:54 4,096 QUAR1.57363

10/15/2008 16:54 4,096 QUAR1.57536

10/15/2008 16:54 4,096 QUAR1.59904

10/15/2008 16:54 4,096 QUAR1.60780

10/15/2008 16:54 4,096 QUAR1.61996

10/15/2008 16:54 120,832 QUAR1.62762

10/15/2008 16:54 14,848 QUAR1.63575

10/15/2008 16:54 225,280 QUAR1.63621

08/16/2008 23:07 927,660 QUAR1.63872

10/15/2008 16:54 4,096 QUAR1.64158

10/15/2008 16:54 4,096 QUAR1.64280

10/15/2008 16:54 4,096 QUAR1.64671

10/15/2008 16:54 4,096 QUAR1.64737

10/15/2008 16:54 61,440 QUAR1.65203

10/15/2008 16:54 933,643 QUAR1.65543

08/16/2008 23:07 126,976 QUAR1.65846

10/15/2008 16:54 4,096 QUAR1.66088

10/02/2008 18:46 25,088 QUAR1.66547

10/15/2008 16:54 4,096 QUAR1.66699

10/15/2008 16:54 244,224 QUAR1.66961

10/15/2008 16:54 4,096 QUAR1.67996

08/16/2008 23:07 93 QUAR1.68057

10/15/2008 16:54 1,431,040 QUAR1.70867

10/15/2008 16:54 4,096 QUAR1.70982

10/15/2008 16:54 4,096 QUAR1.71680

10/02/2008 18:46 420,352 QUAR1.72132

10/15/2008 16:54 4,096 QUAR1.72634

10/02/2008 18:46 927,493 QUAR1.72735

10/15/2008 16:54 4,096 QUAR1.72803

10/15/2008 16:54 40,448 QUAR1.73951

10/15/2008 16:55 284 QUAR1.74141

10/15/2008 16:54 4,096 QUAR1.74215

10/15/2008 16:54 125 QUAR1.75288

08/16/2008 23:07 8,242 QUAR1.75425

08/16/2008 23:07 2,358 QUAR1.75574

10/02/2008 18:46 37,760 QUAR1.76113

10/15/2008 16:54 4,096 QUAR1.77210

10/15/2008 16:54 68,096 QUAR1.78510

10/15/2008 16:54 101,376 QUAR1.78830

10/02/2008 18:46 80,512 QUAR1.78856

10/15/2008 16:55 284 QUAR1.80334

10/15/2008 16:54 4,096 QUAR1.80964

10/15/2008 16:54 4,096 QUAR1.82746

10/15/2008 16:54 4,096 QUAR1.83195

08/16/2008 23:07 3,262 QUAR1.83256

10/15/2008 16:54 1,112 QUAR1.83829

10/15/2008 16:54 1,578 QUAR1.85352

08/16/2008 23:07 297 QUAR1.85490

10/15/2008 16:54 4,096 QUAR1.86076

10/15/2008 16:54 244,160 QUAR1.86185

10/15/2008 16:54 1,353,722 QUAR1.86222

10/15/2008 16:54 4,096 QUAR1.87706

10/15/2008 16:54 27,648 QUAR1.88477

10/15/2008 16:54 4,096 QUAR1.88709

10/15/2008 16:54 4,096 QUAR1.89425

10/15/2008 16:54 101,376 QUAR1.89572

08/16/2008 23:07 2,622 QUAR1.89969

10/15/2008 16:55 100 QUAR1.89991

10/15/2008 16:54 4,096 QUAR1.90266

10/15/2008 16:54 1,431,040 QUAR1.90358

10/02/2008 18:46 37,760 QUAR1.92498

10/15/2008 16:54 4,096 QUAR1.92797

10/15/2008 16:54 4,096 QUAR1.94332

10/15/2008 16:54 40,448 QUAR1.94822

10/15/2008 16:54 364,544 QUAR1.94871

10/15/2008 16:54 4,096 QUAR1.94951

10/15/2008 16:54 4,096 QUAR1.95656

10/15/2008 16:55 284 QUAR1.96795

10/02/2008 18:46 270,336 QUAR1.97374

10/15/2008 16:55 9,728 QUAR1.97391

10/02/2008 18:46 143 QUAR1.97567

10/15/2008 16:54 4,096 QUAR1.97873

10/15/2008 16:54 184,320 QUAR1.99371

10/02/2008 18:46 937,721 QUAR1.99827

10/15/2008 16:54 4,096 QUAR1.99881

10/15/2008 16:54 666 QUAR3.11554

10/15/2008 16:55 500 QUAR3.11654

10/15/2008 16:54 194 QUAR3.12639

10/15/2008 16:55 536 QUAR3.13033

10/02/2008 18:46 220 QUAR3.13120

10/15/2008 16:54 509 QUAR3.13148

10/15/2008 16:54 64 QUAR3.13823

10/15/2008 16:54 81 QUAR3.13858

10/02/2008 18:46 229 QUAR3.13910

10/02/2008 18:46 149 QUAR3.14694

10/15/2008 16:55 210 QUAR3.15250

10/15/2008 16:54 80 QUAR3.16355

10/15/2008 16:54 148 QUAR3.17117

10/15/2008 16:54 112 QUAR3.17792

10/15/2008 16:54 500 QUAR3.20723

10/15/2008 16:54 96 QUAR3.21536

10/15/2008 16:54 194 QUAR3.22136

10/15/2008 16:55 149 QUAR3.22530

10/02/2008 18:46 194 QUAR3.22554

10/15/2008 16:54 220 QUAR3.24637

10/15/2008 16:54 80 QUAR3.24741

10/15/2008 16:54 590 QUAR3.24750

10/15/2008 16:54 178 QUAR3.26093

10/15/2008 16:54 80 QUAR3.27169

08/16/2008 23:07 103 QUAR3.28354

10/15/2008 16:54 148 QUAR3.28773

10/15/2008 16:54 194 QUAR3.29734

10/15/2008 16:54 1,070 QUAR3.30157

10/15/2008 16:54 61 QUAR3.32092

10/15/2008 16:54 148 QUAR3.32764

10/15/2008 16:54 194 QUAR3.34238

10/15/2008 16:54 227 QUAR3.35002

08/16/2008 23:07 64 QUAR3.35584

10/15/2008 16:54 80 QUAR3.35761

10/15/2008 16:54 104 QUAR3.36815

10/15/2008 16:54 164 QUAR3.38068

10/15/2008 16:54 194 QUAR3.38776

10/15/2008 16:54 58 QUAR3.42232

08/16/2008 23:07 125 QUAR3.42262

10/02/2008 18:46 61 QUAR3.44449

10/15/2008 16:54 75 QUAR3.44572

10/02/2008 18:46 339 QUAR3.44827

10/15/2008 16:54 80 QUAR3.46408

10/15/2008 16:54 194 QUAR3.48602

10/02/2008 18:46 64 QUAR3.50086

10/15/2008 16:55 160 QUAR3.51771

10/15/2008 16:54 80 QUAR3.52088

10/15/2008 16:54 194 QUAR3.52634

10/15/2008 16:54 101 QUAR3.53310

10/15/2008 16:55 238 QUAR3.55115

10/15/2008 16:54 194 QUAR3.56276

10/15/2008 16:54 68 QUAR3.57519

10/15/2008 16:55 641 QUAR3.59392

10/15/2008 16:54 194 QUAR3.63435

10/15/2008 16:54 194 QUAR3.65741

08/16/2008 23:07 61 QUAR3.66595

10/15/2008 16:54 80 QUAR3.66618

10/15/2008 16:54 149 QUAR3.67148

10/15/2008 16:54 194 QUAR3.68247

10/15/2008 16:54 194 QUAR3.69107

10/15/2008 16:54 129 QUAR3.69172

10/15/2008 16:54 135 QUAR3.69711

10/15/2008 16:54 194 QUAR3.70882

08/16/2008 23:07 176 QUAR3.70907

10/15/2008 16:54 194 QUAR3.76079

10/15/2008 16:54 194 QUAR3.77261

10/15/2008 16:54 277 QUAR3.78049

10/15/2008 16:54 229 QUAR3.78718

10/15/2008 16:55 507 QUAR3.79507

10/15/2008 16:54 126 QUAR3.80256

10/15/2008 16:54 194 QUAR3.81507

10/15/2008 16:54 502 QUAR3.82128

10/15/2008 16:54 101 QUAR3.82210

10/15/2008 16:55 160 QUAR3.82894

10/15/2008 16:54 250 QUAR3.83735

08/16/2008 23:07 232 QUAR3.83866

10/15/2008 16:54 72 QUAR3.84598

10/15/2008 16:54 148 QUAR3.84633

10/15/2008 16:54 194 QUAR3.84774

10/15/2008 16:54 534 QUAR3.85065

10/15/2008 16:54 53 QUAR3.85618

10/15/2008 16:54 183 QUAR3.86476

10/15/2008 16:54 194 QUAR3.86554

10/15/2008 16:54 53 QUAR3.86886

10/15/2008 16:54 194 QUAR3.89319

10/15/2008 16:54 229 QUAR3.90994

10/02/2008 18:46 149 QUAR3.92843

10/15/2008 16:54 637 QUAR3.93843

10/15/2008 16:55 210 QUAR3.94325

10/15/2008 16:54 80 QUAR3.94863

10/02/2008 18:46 229 QUAR3.95028

10/15/2008 16:54 69 QUAR3.95101

10/15/2008 16:54 80 QUAR3.99158

492 File(s) 15,685,361 bytes

2 Dir(s) 9,998,794,752 bytes free

Link to post
Share on other sites

OK, its done.

Mr Smurf, I thank you for uploading the files. I have sent you a private message explaining what I did and did not find. At this point, I'm sure you will agree (once you read the message) that their is no point in continuing this thread, so I'm going to go ahead and close it now. All the best.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.