Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

Please wait while windows configures symantic antivirus II

MalwareRemoval.com provides free support for people with infected computers. Using plain language that anyone can understand, our community of volunteer experts will walk you through each step.

Re: Please wait while windows configures symantic antivirus

Unread postby deltalima » September 4th, 2010, 4:31 pm

Hi hamiltonjoe1950,

I cannot copy and paste the RK Unhooker report as it says that it is 150,000 characters and the limit is 100,000.


Please split the RKU log into two and post in two separate posts.
User avatar
deltalima
Admin/Teacher
Admin/Teacher
 
Posts: 7614
Joined: February 28th, 2009, 4:38 pm
Location: UK
Advertisement
Register to Remove

Re: Please wait while windows configures symantic antivirus

Unread postby hamiltonjoe1950 » September 4th, 2010, 9:13 pm

Thanks for the suggestion, I'll give that a try. Hopefully, this will be the first half:

RkUnhooker report generator v0.7
==============================================
Rootkit Unhooker kernel version: 3.7.300.505
==============================================
Windows Major Version: 5
Windows Minor Version: 1
Windows Build Number: 2600
==============================================
>Drivers
Driver: C:\WINDOWS\system32\ntkrnlpa.exe
Address: 0x804D7000
Size: 2150400 bytes

Driver: PnpManager
Address: 0x804D7000
Size: 2150400 bytes

Driver: RAW
Address: 0x804D7000
Size: 2150400 bytes

Driver: WMIxWDM
Address: 0x804D7000
Size: 2150400 bytes

Driver: Win32k
Address: 0xBF800000
Size: 1855488 bytes

Driver: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000
Size: 1855488 bytes

Driver: C:\WINDOWS\system32\DRIVERS\w39n51.sys
Address: 0xF7228000
Size: 1429504 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
Address: 0xF73ED000
Size: 1355776 bytes

Driver: C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20100402.004\navex15.sys
Address: 0xA9D93000
Size: 1318912 bytes

Driver: C:\WINDOWS\system32\DRIVERS\hsx_dpv.sys
Address: 0xAA617000
Size: 1011712 bytes

Driver: C:\WINDOWS\System32\ialmdd5.DLL
Address: 0xBF077000
Size: 925696 bytes

Driver: C:\WINDOWS\System32\Drivers\dump_iaStor.sys
Address: 0x9F446000
Size: 876544 bytes

Driver: iaStor.sys
Address: 0xF828E000
Size: 876544 bytes

Driver: C:\WINDOWS\system32\DRIVERS\hsx_cnxt.sys
Address: 0xAA561000
Size: 745472 bytes

Driver: Ntfs.sys
Address: 0xF81B8000
Size: 577536 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
Address: 0xA48BD000
Size: 458752 bytes

Driver: C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys
Address: 0xA485F000
Size: 385024 bytes

Driver: C:\WINDOWS\system32\DRIVERS\update.sys
Address: 0xF7117000
Size: 385024 bytes

Driver: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xA4A28000
Size: 364544 bytes

Driver: C:\WINDOWS\system32\DRIVERS\srv.sys
Address: 0x9F0E9000
Size: 356352 bytes

Driver: C:\Program Files\Symantec AntiVirus\savrt.sys
Address: 0xA9F06000
Size: 348160 bytes

Driver: C:\WINDOWS\System32\ATMFD.DLL
Address: 0xBFFA0000
Size: 286720 bytes

Driver: C:\WINDOWS\System32\Drivers\HTTP.sys
Address: 0x9EB68000
Size: 266240 bytes

Driver: C:\WINDOWS\System32\Drivers\SYMTDI.SYS
Address: 0xA49E8000
Size: 262144 bytes

Driver: C:\WINDOWS\system32\DRIVERS\hsxhwazl.sys
Address: 0xAA70E000
Size: 237568 bytes

Driver: C:\WINDOWS\System32\ialmdev5.DLL
Address: 0xBF042000
Size: 217088 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rdpdr.sys
Address: 0xF7198000
Size: 196608 bytes

Driver: ACPI.sys
Address: 0xF8405000
Size: 188416 bytes

Driver: C:\WINDOWS\system32\drivers\ADIHdAud.sys
Address: 0xAA792000
Size: 188416 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mrxdav.sys
Address: 0x9F1E0000
Size: 184320 bytes

Driver: NDIS.sys
Address: 0xF818B000
Size: 184320 bytes

Driver: C:\WINDOWS\system32\DRIVERS\e1e5132.sys
Address: 0xF7385000
Size: 180224 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rdbss.sys
Address: 0xA492D000
Size: 176128 bytes

Driver: C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
Address: 0xF73B1000
Size: 163840 bytes

Driver: C:\WINDOWS\system32\DRIVERS\netbt.sys
Address: 0xA499A000
Size: 163840 bytes

Driver: C:\WINDOWS\system32\drivers\AEAudio.sys
Address: 0xAA748000
Size: 155648 bytes

Driver: dmio.sys
Address: 0xF8391000
Size: 155648 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ipnat.sys
Address: 0xA49C2000
Size: 155648 bytes

Driver: C:\WINDOWS\system32\drivers\portcls.sys
Address: 0xAA76E000
Size: 147456 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBPORT.SYS
Address: 0xF7204000
Size: 147456 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ks.sys
Address: 0xF7175000
Size: 143360 bytes

Driver: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xA4978000
Size: 139264 bytes

Driver: C:\WINDOWS\System32\ialmdnt5.dll
Address: 0xBF020000
Size: 139264 bytes

Driver: ACPI_HAL
Address: 0x806E4000
Size: 134400 bytes

Driver: C:\WINDOWS\system32\hal.dll
Address: 0x806E4000
Size: 134400 bytes

Driver: fltmgr.sys
Address: 0xF826E000
Size: 131072 bytes

Driver: ftdisk.sys
Address: 0xF83B7000
Size: 126976 bytes

Driver: pcmcia.sys
Address: 0xF83D6000
Size: 122880 bytes

Driver: C:\Program Files\Symantec\SYMEVENT.SYS
Address: 0xA9EE9000
Size: 118784 bytes

Driver: Mup.sys
Address: 0xF8171000
Size: 106496 bytes

Driver: atapi.sys
Address: 0xF8364000
Size: 98304 bytes

Driver: C:\WINDOWS\system32\drivers\tmcomm.sys
Address: 0x9F059000
Size: 98304 bytes

Driver: KSecDD.sys
Address: 0xF8245000
Size: 94208 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndiswan.sys
Address: 0xF71D9000
Size: 94208 bytes

Driver: C:\WINDOWS\system32\DRIVERS\irda.sys
Address: 0x9F430000
Size: 90112 bytes

Driver: Shockprf.sys
Address: 0xF837C000
Size: 86016 bytes

Driver: C:\WINDOWS\system32\drivers\wdmaud.sys
Address: 0x9F353000
Size: 86016 bytes

Driver: C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20100402.004\naveng.sys
Address: 0xA9D7F000
Size: 81920 bytes

Driver: C:\Program Files\Symantec AntiVirus\Savrtpel.sys
Address: 0xA9ED5000
Size: 81920 bytes

Driver: C:\WINDOWS\system32\DRIVERS\sdbus.sys
Address: 0xF71F0000
Size: 81920 bytes

Driver: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS
Address: 0xF73D9000
Size: 81920 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ipsec.sys
Address: 0xA4A81000
Size: 77824 bytes

Driver: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBF000000
Size: 73728 bytes

Driver: sr.sys
Address: 0xF825C000
Size: 73728 bytes

Driver: pci.sys
Address: 0xF83F4000
Size: 69632 bytes

Driver: C:\WINDOWS\system32\DRIVERS\psched.sys
Address: 0xF71C8000
Size: 69632 bytes

Driver: C:\WINDOWS\system32\DRIVERS\nic1394.sys
Address: 0xF85D4000
Size: 65536 bytes

Driver: ohci1394.sys
Address: 0xF8594000
Size: 65536 bytes

Driver: C:\WINDOWS\system32\DRIVERS\arp1394.sys
Address: 0xA4F96000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\drivers\drmk.sys
Address: 0xF301F000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\drivers\sysaudio.sys
Address: 0xF8794000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbhub.sys
Address: 0xF2954000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\DRIVERS\1394BUS.SYS
Address: 0xF85A4000
Size: 57344 bytes

Driver: C:\WINDOWS\System32\ialmrnt5.dll
Address: 0xBF012000
Size: 57344 bytes

Driver: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
Address: 0xF8574000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\i8042prt.sys
Address: 0xF7E00000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
Address: 0xF7DF0000
Size: 53248 bytes

Driver: VolSnap.sys
Address: 0xF8554000
Size: 53248 bytes

Driver: C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\PrivateDiskM.sys
Address: 0x9F6F4000
Size: 49152 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspptp.sys
Address: 0xF7DD0000
Size: 49152 bytes

Driver: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xA76F3000
Size: 45056 bytes

Driver: MountMgr.sys
Address: 0xF8544000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspppoe.sys
Address: 0xF7DE0000
Size: 45056 bytes

Driver: isapnp.sys
Address: 0xF8534000
Size: 40960 bytes

Driver: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xF7D90000
Size: 40960 bytes

Driver: C:\WINDOWS\system32\DRIVERS\termdd.sys
Address: 0xF7DB0000
Size: 40960 bytes

Driver: disk.sys
Address: 0xF8564000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\intelppm.sys
Address: 0xF7E10000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\msgpc.sys
Address: 0xF7DC0000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\netbios.sys
Address: 0xA7713000
Size: 36864 bytes

Driver: PxHelp20.sys
Address: 0xF8584000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\wanarp.sys
Address: 0xA4F86000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\atmeltpm.sys
Address: 0xF884C000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\Drivers\Modem.SYS
Address: 0xF8854000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xA5418000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\drivers\Smapint.sys
Address: 0xF666A000
Size: 32768 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbehci.sys
Address: 0xF882C000
Size: 32768 bytes

Driver: C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS
Address: 0xA97A7000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\nscirda.sys
Address: 0xF8844000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS
Address: 0xF87B4000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\PROCDD.SYS
Address: 0x9FCAC000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\RimSerial.sys
Address: 0xF8884000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\kbdclass.sys
Address: 0xF8834000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mouclass.sys
Address: 0xF883C000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\Drivers\rkhdrv40.SYS
Address: 0xA5408000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\drivers\TDSMAPI.SYS
Address: 0xF6672000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\drivers\TSMAPIP.SYS
Address: 0xF881C000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbuhci.sys
Address: 0xF8824000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xA5430000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\wanatw4.sys
Address: 0xF887C000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\AegisP.sys
Address: 0xF4AA6000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xA5420000
Size: 20480 bytes

Driver: PartMgr.sys
Address: 0xF87BC000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ptilink.sys
Address: 0xF886C000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasirda.sys
Address: 0xF885C000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspti.sys
Address: 0xF8874000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\TDI.SYS
Address: 0xF8864000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\Drivers\TPHKDRV.SYS
Address: 0xF667A000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\drivers\Tppwrif.sys
Address: 0xF6682000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\watchdog.sys
Address: 0x9FEF0000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\BATTC.SYS
Address: 0xF894C000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\CmBatt.sys
Address: 0xF7540000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\drivers\ibmfilter.sys
Address: 0x9F20D000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
Address: 0x9F1DC000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mssmbios.sys
Address: 0xF8A24000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndisuio.sys
Address: 0xA95CA000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\s24trans.sys
Address: 0xA9CB3000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\tp4track.sys
Address: 0xF754C000
Size: 16384 bytes

Driver: ACPIEC.sys
Address: 0xF8950000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\drivers\ANC.SYS
Address: 0xA4B64000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xF8944000
Size: 12288 bytes

Driver: compbatt.sys
Address: 0xF8948000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0x9F5B8000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\Drivers\i2omgmt.SYS
Address: 0xF8A28000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ibmpmdrv.sys
Address: 0xF753C000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\irenum.sys
Address: 0xF7548000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndistapi.sys
Address: 0xF8A0C000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasacd.sys
Address: 0xA95B2000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xA9FAE000
Size: 8192 bytes

Driver: dmload.sys
Address: 0xF8A38000
Size: 8192 bytes

Driver: C:\WINDOWS\SYSTEM32\EGATHDRV.SYS
Address: 0xA1D96000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xA9FB0000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\Drivers\IBMBLDID.sys
Address: 0xA5180000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xF8A34000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xA9FA6000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\drivers\pmemnt.sys
Address: 0xA1A7B000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xA9FA4000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\RootMdm.sys
Address: 0xF8A90000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\ShockMgr.SYS
Address: 0xA9FEA000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\swenum.sys
Address: 0xF8A92000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBD.SYS
Address: 0xAA012000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\WMILIB.SYS
Address: 0xF8A36000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\audstub.sys
Address: 0xF8C45000
Size: 4096 bytes

Driver: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xF8B7E000
Size: 4096 bytes

Driver: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xF8BF2000
Size: 4096 bytes

Driver: C:\WINDOWS\system32\DRIVERS\OPRGHDLR.SYS
Address: 0xF8AFD000
Size: 4096 bytes

Driver: pciide.sys
Address: 0xF8AFC000
Size: 4096 bytes

Driver: C:\Program Files\SMI2\smi2.sys
Address: 0xF8B12000
Size: 4096 bytes

==============================================
>Stealth
==============================================
>Files

Suspect File: C:\Documents and Settings\Tom\Application Data\Macromedia\Flash Player\#SharedObjects\LPYZ5TNR\cdn.insights.gravity.com\moth_v1.swf\cookies.sol Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Application Data\Macromedia\Flash Player\#SharedObjects\LPYZ5TNR\vizu.com\acUserData.sol Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#cdn.insights.gravity.com\settings.sol Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#vizu.com\settings.sol Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sol Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@2o7[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@33across[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@ad.yieldmanager[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@adbrite[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@ads.pubmatic[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@burstnet[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@choicehotels[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@comfortinn[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@content.yieldmanager[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@delb.opt.fimserve[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@exelator[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@fastclick[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@invitemedia[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@mathtag[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@mediaplex[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@network.realmedia[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@pubmatic[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@quantserve[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@roia[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@tap.rubiconproject[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@trvlnet.adbureau[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@w55c[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Cookies\tom@www.thecommonground.proboards[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Favorites\Genealogy\Military Sites\Civil War Information\Civil War Literature.url Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1282589535[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1305881310@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1338abf7cdd89cf9c498698cfae77989[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1474761575@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1516718605@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1587938649@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\1815600721@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[7].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[8].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\22142-2[9].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\24222-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\24222-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\3f7d94a609386f731147190ed97e6e2b[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\3f7d94a609386f731147190ed97e6e2b[2].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\4c2f37c453a99ef4ebbdc09c88ba967[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\502987748@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\662952750@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\665365090@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\728x90_WhiteBG_RealOrFake_Cartoon2[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\750980886@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\897729994@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\932531579@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ab[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\activityi;src=2075212;type=singl045;cat=choic731;ord=1[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\activityi;src=2075212;type=singl045;cat=choic731;ord=331267081595[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\adopt[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\adopt[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ads[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ads[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ads[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ads[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ads[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ads[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ad[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ad_call[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\alice[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\BannerAd-Elections[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\beacon[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\beacon[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\blockquote[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\bold[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\bullet[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\bullet_hl[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\capture[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\capture[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\capture[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.client-alerts[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.header[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.my-favorites[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.promo[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.search-map[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.search-results-listing[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.search[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\chi.mod.user-login[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\choicehotels-ebrochure[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\choicehotels-general[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\choicehotels_com[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\clarion-flyout[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\close[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\code[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\crossdomain[1].xml Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CS[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\cutil040cc81d678280d731cd717bf5101fe0[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CWLit-Home-Divided-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CWLit-Home-Emmanc-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CWLit-LeftNav-About[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CWLit-LeftNav-RefList[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CWLit-LeftNav-SiteMap-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\CWLit-LeftNav-SiteMap[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ddichamp8_2926_728x90[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\delete[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\dk[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\dk[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\dk[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\DoublePoints75x55--chpl[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\dqm_loader[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Econo_Button_75x55--chpl[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\faviconA[1].ico Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\fo[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\fp[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ftr-rounded-box-spr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ftr-rounded-box-spr[2].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\f[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\GA_728x90_GUN_freetrial[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\gbl-amenities-spr-off[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\GetImage[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\GetImage[2].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\GetSidPixelTag[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\GetSidPixelTag[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\GetSidPixelTag[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\get[1].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\glow[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\hdr-logo[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\hdr-search-btn-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\hdr-search-home-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\hdr-search-tab-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Header-TopCWLit-2[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Header-TopCWLit-3[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Header-TopCWLit-3[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\help[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\hide[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\home[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Hotel-Services[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\imgfy[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\imp[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\imp[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\imp[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\index[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\index[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ip[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\jquery-1.3.2.min[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\jquery-ui-1.7.1.custom.min[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\jquery.jcarousel.pack[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\jquery.jcarousel.pack[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\jquery.tablesorter[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Keyword=%20%20%20%20SI_DEST_NA.US.Nevada[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\kiss[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\lmb-15601-32802-48366[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\logo1w[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\logout[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\male[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\map-panel-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\map-view[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mapcontrol[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\media452244[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\messages[1].json Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\messages[2].json Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmmss[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmmss[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmmss[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmmss[4].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[5].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[6].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[7].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[8].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\mmtnt[9].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\modify[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\on[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\other-rates-arrow[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\other-rates-arrow[2].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA010A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107A2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107C1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107C1[2].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107G3[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107I1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107K1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA107K8[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA129A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA156A1[1].jpg Status: Hidden

Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA157A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA162A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA184A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA253A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA409A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA415A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\partner-offers-75x55--chpl[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\pixel[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PlaceSuggest[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PlaceSuggest[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\poi-available-lrg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Pug[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\quant[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\reply[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\right[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\r[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\r[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\sendtopic[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\showad[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\sol_updater[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\StdBanner[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\td[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\tele[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\thumbup[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_AlinFrock[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_Bierer[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_Glover-web1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_Mandrackie[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\topics[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[5].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[6].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\t[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ui-icons_333333_256x240[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ui.dropdownchecklist[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\undecided[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\user144_pic853_1272426825[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ViewArticleText[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ViewArticleText[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ViewEntryImage[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\wink[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\WI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\xx[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\youtube2[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\100817_levis_mom_728x90[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1139140973@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1166312205@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1282589535[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1331602729@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1607312096@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1639818342@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1879692395@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1976471949@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\24222-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\24222-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\24222-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\324686858@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\399592193@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\535608161@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\558395488@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\5E17CDBB-D95E-4746-BB6F-2CA28596B948[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\65263-728x90-dowhatyawanna-ver2[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\730560052@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\976061340@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\about[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\activityi;src=2075212;type=gener122;cat=booki614;ord=1[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\activityi;src=2075212;type=gener122;cat=booki614;ord=6912556414680[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\adopt[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\adopt[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[6] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[7] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[8] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[9] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\adtrackJf6ebaff8253a3377ed73cf13d386f937[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\AHTCGavatar[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\andes[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\arrow[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\Avenir_45_Book_FONT[1].swf Status: Hidden

Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA157A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA162A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA184A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA253A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA409A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PA415A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\partner-offers-75x55--chpl[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ping[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\pixel[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PlaceSuggest[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\PlaceSuggest[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\poi-available-lrg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\Pug[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\quant[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\reply[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\right[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\r[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\r[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\sendtopic[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\showad[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\sol_updater[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\StdBanner[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\st[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\td[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\tele[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\thumbup[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_AlinFrock[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_Bierer[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_Glover-web1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\th_Mandrackie[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\topics[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[5].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\two[6].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\t[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ui-icons_333333_256x240[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ui.dropdownchecklist[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\undecided[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\user144_pic853_1272426825[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ViewArticleText[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ViewArticleText[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\ViewEntryImage[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\wink[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\WI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\xx[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\GXI3ZRVX\youtube2[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\100817_levis_mom_728x90[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1139140973@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1166312205@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1282589535[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1331602729@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1607312096@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1639818342@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1879692395@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\1976471949@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\22142-2[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\24222-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\24222-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\24222-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\324686858@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\399592193@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\535608161@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\558395488@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\5E17CDBB-D95E-4746-BB6F-2CA28596B948[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\65263-728x90-dowhatyawanna-ver2[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\730560052@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\976061340@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\about[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\activityi;src=2075212;type=gener122;cat=booki614;ord=1[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\activityi;src=2075212;type=gener122;cat=booki614;ord=6912556414680[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\adopt[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\adopt[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[6] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[7] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[8] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ads[9] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\adtrackJf6ebaff8253a3377ed73cf13d386f937[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\AHTCGavatar[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\andes[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\arrow[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\Avenir_45_Book_FONT[1].swf Status: Hidden
hamiltonjoe1950
Active Member
 
Posts: 14
Joined: August 27th, 2010, 9:13 pm

Re: Please wait while windows configures symantic antivirus

Unread postby hamiltonjoe1950 » September 4th, 2010, 9:28 pm

Hopefully this will be the 2nd half:

Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\a[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\BannerAd-EC[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\beacon[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\beacon[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\blank[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\bookmark[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\bullet-black[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\calendar[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\capture[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\capture[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\capture[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\capture[4].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\chi.mod.content-tools[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\chi.mod.my-favorites[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\choicehotels[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\clarion-flyout[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\click[1].here Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\close[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\comfortinn[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CommonGroundHeader[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\cry[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWLit-Home-Aspects-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWLit-Home-Escapes-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWLit-Home-Guerilla-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWLit-LeftNav-Bottom[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWLit-LeftNav-WebWarn-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWLit-LeftNav-WebWarn[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\CWtLit-SubLevel-Home[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\d827d995f4fc589bfbd1c433658e1ae2[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ddichamp8_4480_728x90_vflash8[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\dk[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\dk[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\dk[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\dk[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\DocumentDotWrite[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\earnafreenight-flash-alternate[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\email2[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\favicon[1].ico Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\flash3[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\fmr[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\fm[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\gbl-btn-spr-right[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\gbl-btn-spr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetImage[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetImage[2].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetImage[3].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetImage[4].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetSidPixelTag[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetSidPixelTag[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetSidPixelTag[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\GetSidPixelTag[4].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\get[1].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\get[2].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\get[3].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\get[4].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\get[5].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\google_service[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hdr-personalization-arrow.orange[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hdr-search-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hdr-search-btn-fg-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hdr-search-home-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hdr-search-large-text-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\Header-TopCWLitTag[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\Header-TopCWLitTag[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hotel-list-deals-icon[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hotthread[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\hr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\imp[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\imp[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\imp[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\imp[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\index[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\index[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\index[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\italicize[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\jquery-ui-1.7.1.custom.min[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\jquery-ui-1.7.2.custom[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\jquery.hint.pw[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\jquery.treeview[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\jquery.treeview[2].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\lcw[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\learn-more-english[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\members[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[4].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[5].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[6].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmmss[7].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[5].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[6].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mmtnt[7].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mobile-bonus--chpl[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mod-search-results-filter-bg[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\mod-search-small-map-container[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\module[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\moth_v1[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\my-stay-black-heart[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\n727398895_1015058_8014[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\nav_logo14[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\newthread[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ntpagetag[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\online[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA058A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA064A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107B3[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107B4[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107C2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107F2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107F3[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107K5[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA107K6[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA135A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA295A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA347A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA372A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA470A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA526A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA585A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PA586A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ping[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ping[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ping[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PlaceSuggest[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\pre[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\print[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\PvtChaseOsborne-1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\QI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\quote2[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\quote[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\relocate=;sz=728x90;ord=3779852466[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\sad[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\shadow[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\shocked[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\st[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\st[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\st[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\st[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\st[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\sup[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\swfobject[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\swfobject[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\s_code[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\tap[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\thread[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\th_2010DansAvitar[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\th_captain[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\th_Schenck_Tom[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\tpp4[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\trans-button[2].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\two[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\two[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\two[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\two[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\two[5].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\two[6].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ui-bg_glass_75_dadada_1x400[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ui-dropdown[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\verisignLogoai[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\verisignLogoai[2].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\veryhotthread[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\ViewArticleText[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\visa-thumb-1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\NIOFJPPI\wowtrial08_728x90_flash_11million_linkshare[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1008001241@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1161259475@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1282589535[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1282589535[2].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1402230202@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1463906868@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1675347077@Top1[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\1846078886@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2CAW16F64.js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[10].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[11].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[7].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[8].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\22142-2[9].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\24222-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\24222-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\24222-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\24222-2[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\3f7d94a609386f731147190ed97e6e2b[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\457326353@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\460127524@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\50x50-customer-support--chpl[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\603217723@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\751725585@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\881832758@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\aaa-card-lrg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\address-bullets[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\admin[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\adopt[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\AdServerServlet[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\adServer[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[6] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[7] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ads[8] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\avechh_SOHotelsSearchResults_10[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Avenir_55_Roman_FONT[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\beacon[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Blank_1x1[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\body-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\browser_ie[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\capture[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\capture[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\capture[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\capture[4].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\capture[5].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CarouselDocument[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\chi.mod.chi-ebrochure-gallery[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\chi[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\chi[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\choicehotels-base[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\choicehotels-search[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\click[1].here Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CommentaryPage[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\cookie_util_so[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\cool[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-Home-Battles-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-Home-Women-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-LeftNav-CWStories-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-LeftNav-Image[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-LeftNav-Preface-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-LeftNav-Preface[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-SubLevel-Battles[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\CWLit-SubTitle-Antietam[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\deals-icon-tag-happy-string[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[7].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[8].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dk[9].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\dr_rwl_v2[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Duel[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\email_sm[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\faviconCI[1].ico Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\favicon[1].ico Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\flashwrite_1_2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\fred_at_vburg[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ga[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\generic-map[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\GetImage[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\GetImage[2].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\GetImage[3].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\GetSidPixelTag[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\GetSidPixelTag[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\get[1].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\gift-card-75x55(2)--chpl[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\google_ads2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\google_ads[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\gp-offer-logo[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\grin[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\hdr-personalization-arrow.orange[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\hdr-search-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\hdr-search-btn-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\hdr-search-btn-fg-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\hdr-search-tab-spr-en[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Header-TopCWLit-1[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Header-TopCWLit-1[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Hotel-Photos[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\HotelList[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\huh[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ielogodl[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\IMG_0500[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\imp[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\imp[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\imp[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\imp[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\index[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\info[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\jquery-1.3.2.min[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\jquery-ui-1.7.2.custom[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\jquery.hint.pw[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\jquery.qtip[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\jquery.qtip[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\jquery.validate.min[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\lb[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\left[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\list[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\lmb-15601-32802-48366[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Logo_25wht[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mapcontrol[1].ashx Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\message_sm[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mmmss[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mmmss[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mmmss[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mmtnt[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mmtnt[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\mmtnt[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\msn[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\my-stay-black-heart[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\new[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ntpagetag[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA030127-1-1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107B1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107C2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107D1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107G1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107K10[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107K2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107K3[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA107K9[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA257A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA302A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA321A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA337A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA529A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA554A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA558A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA591A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PA628A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\pixel[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PlaceSuggest[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\PlaceSuggest[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\poi-available-sml[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\poi-unavailable-sml[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\profile[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Pug[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Pug[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\q[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\register[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\reserve-online--chps[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\rsm-package-loader[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\r[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\script44[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\search2[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\size[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\slf[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\starblue[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\start-f253239139[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\strike[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\st[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\st[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\st[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\sub[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\syncuppixels[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\table[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\TanAd[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\tap[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\th_BillToon[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\th_JudyB[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\th_KCain[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\th_tomh[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\tongue[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\tpp4[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\tracking_only[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\transparent[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\Transparent[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\two[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\two[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\two[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ui-bg_glass_65_f7eba6_1x400[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ui-bg_highlight-soft_0_ffffff_1x100[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\underline[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\url[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\V2FreePhone_HotPhone_728x90_081010[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\v8flash[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ViewArticleText[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\wv326redirect_A[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\OYLPFJUG\ZI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1032765473@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1050802195@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1077041087@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1100483571@Top1[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1145421341@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1409156863@Top1[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1559323059@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1606669552@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1703285735@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\1986084866@Top1[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22142-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22142-2[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22142-2[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22142-2[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22142-2[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22142-2[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\22aa45d54b977a37c993d89fcdf44c9[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\24222-2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\295207331@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\316a78e02c69181b7ef6d5aaf2f395b5[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\3f7d94a609386f731147190ed97e6e2b[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\504824135@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\50x50-customer-support--chps[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\626260312@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\751381568@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\831446934@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\873205985@Bottom3[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\9385b27210aa1b600ccd2585a2b884f7[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\aboutXP[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\adopt[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\adopt[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\adopt[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[10] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[5] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[6] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[7] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ads[8] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\aim[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\angry[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Avenir_85_Heavy_FONT[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\beacon[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Best-Rate-75x55--chpl[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\c47b1908445e8ddae83d1e6fb65ebf42[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\capture[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\capture[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\capture[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\capture[4].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\capture[5].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\capture_moth_min102[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\cda1.2[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\center[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\chi.gbl.validation[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\chi.mod.header[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\chi.mod.search[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\chi.mod.table-data[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\chi.webmetrics[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\chi.webmetrics[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\choicehotels-base[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\choicehotels-ebrochure[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\choicehotels-general[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\choicehotels-search[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\choicehotels[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\clickenc=[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\close[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CommentaryPage[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\content-tools-spr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\csites[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-Home-Blacks-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-Home-Children-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-Home_03[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-LeftNav-About-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-LeftNav-CWStories[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-LeftNav-RefList-over[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-LeftNav-Spacer[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-SubLevelPipe[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\CWLit-SubTitle-14thGetty[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\DHTMLDataCWLnew[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[4].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[5].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[6].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dk[7].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\dr_rwl_v2[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\DR_v4[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\EI[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\embarassed[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\face[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\flag[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\FSC10893-1_728x90_2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\gbl-amenities-spr-on[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\gbl-btn-spr-right[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\gbl-btn-spr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\gbl-rounded-box-spr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\GetImage[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\GetImage[2].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\GetImage[3].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\GetSidPixelTag[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\GetSidPixelTag[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\GetSidPixelTag[3].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\getverisignsealimage[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\getverisignsealimage[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\get[1].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\get[2].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\get[3].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\get[4].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\get[5].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\get[6].media Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\gold-medal[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\google_com[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\green-hotel[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\hdr-hotels-nav-tm-spr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\hdr-logo[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\hdr-search-combined-tabs-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Header-TopCWLit-2[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\hotel-features-nav-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\hotel-list-deals-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\img[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\imp[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\imp[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\imp[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\imp[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\index[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\JCAH_SARA_GREEN_JC0118c3_8.2.10_728x90[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\jquery.thickbox[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\jquery.thickbox[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\laugh[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\lcw[1].css Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\lipsrsealed[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\login[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\map-large-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\markasread[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Mark_728x90_VC[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmmss[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmmss[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmmss[3].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmmss[4].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmmss[5].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmmss[6].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmtnt[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmtnt[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmtnt[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\mmtnt[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\moth_v1[1].swf Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\move[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\MS[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\musterpic2-1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\MyFavoritesShared[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\MyFavoritesShared[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\nc_tuhead[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\nEMIMQKHcjc[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\newpoll[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\off[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA029A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA041A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107A2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107B2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107E1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107F1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107G2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107K2[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107K4[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107K7[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA107K9[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA130A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA181A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA274A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA428A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PA547A1[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\page_parser[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ping[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ping[2].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ping[3].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PlaceSuggest[1].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\PlaceSuggest[2].txt Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Pug[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\rolleyes[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\roomtorebuild--chpl[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\rsm-package-loader[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\r[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\search[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\set[2].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Shape-ups_bounce_back_728x90[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\smiley[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\starred[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\star[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\st[1] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\st[2] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\st[3] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\st[4] Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\s_code[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\tap[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\th_GregMartinRM[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\th_JoePortrait[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\th_KenstareRMavatar[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\th_SteveRM[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\th_Stretchy[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\tool-bar-bg[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\tr[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[1].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[2].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[3].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[4].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[5].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[6].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[7].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\two[8].php Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\uat_7111[1].js Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ui-bg_glass_100_ffffff_1x400[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ui-bg_glass_60_f0f0f0_1x400[1].png Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ViewArticleText[1].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\ViewArticleText[2].htm Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\visitor[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\Wallys_Haircomb[1].jpg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\Local Settings\Temporary Internet Files\Content.IE5\V1RIN7J7\www_sm[1].gif Status: Hidden


Suspect File: C:\Documents and Settings\Tom\My Documents\Pictures to be categorized\Salvation Army Photos\Camp Swoneky Photos\1961 - Hamilton Girls - Frances Jones, patty Smith, Betty Butler, karen eversole, Andrea Callahan, Sheila Huff, Linda Winkler, Patty Pyles, Rita Broughton & susan Baxendale, Brenda Pyles.jpgg Status: Hidden


Suspect File: C:\Documents and Settings\Tom\My Documents\Pictures to be categorized\Salvation Army Photos\Camp Swoneky Photos\1969 HL Camp - Minnie Hood, Carol Parcher, Capt Ady Canty, Lt. G. Sprague, Capt Lil Dietrick, Melva Windsor, Capt. Ann Kirby, Zelma Walraven, Elsie Stahl, Dorothy Lynch.jpgmilton singers.jpg Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\CREDHIST Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-500\c3e0c414-4736-46cf-8bc7-489c36ea5e38 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-1-5-21-3692273407-2273381536-4023909579-500\b8f79699-87ba-4595-ae03-a88c547a58fe Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-1-5-21-3692273407-2273381536-4023909579-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-1-5-21-430614108-2175211297-1803647944-500\e644ca1f-f319-4106-8aa8-bafd3037ffdb Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-1-5-21-430614108-2175211297-1803647944-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\S-1-5-18\075565f57e1abf53ccc9ca66560b8be0_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\S-1-5-18\42e7e898003fbdeb9585806ee1664b51_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\S-1-5-18\8f71098770f72c7a67cd8f1151619865_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\S-1-5-18\b973ec0ff915c48a18fe09064ce3a22d_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\S-1-5-18\d42cc0c3858a58db2db37658219e6400_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Default User\Application Data\Microsoft\Protect\CREDHIST Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Default User\Application Data\Microsoft\Protect\S-1-5-21-3692273407-2273381536-4023909579-500\b8f79699-87ba-4595-ae03-a88c547a58fe Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Default User\Application Data\Microsoft\Protect\S-1-5-21-3692273407-2273381536-4023909579-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Default User\Application Data\Microsoft\Protect\S-1-5-21-430614108-2175211297-1803647944-500\e644ca1f-f319-4106-8aa8-bafd3037ffdb Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Default User\Application Data\Microsoft\Protect\S-1-5-21-430614108-2175211297-1803647944-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\146482325737612d5fbcd71839d49d49_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\360e9316558dc5fc61c74119e7e1abb7_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\6b29ae44e85efac3c72ff4d1865d73f1_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\83aa4cc77f591dfc2374580bbd95f6ba_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\8f71098770f72c7a67cd8f1151619865_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\9580d41f9fe5955aae43cac3c1301523_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\a3b323e7b0ad9f440bc07165b06ba2b7_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\b8c692a09df07c5054dfd41d865fdeb4_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Crypto\RSA\S-1-5-21-2244424893-2629147862-639317376-1005\e52f73ea1e6d8fb5afd750e25de6c8fa_a8870031-341f-400f-93be-f0f2f7bb19f4 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\CREDHIST Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\1d847ce0-b122-4f30-9131-2d76ff50f356 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\2b1e86c5-9366-4a61-b57d-9f14a4f6f890 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\3cfdfdc8-afb2-4c01-8de2-76d69a474a76 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\5de2d9d5-e39a-4d56-9ced-95cb2b246de3 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\70a7dfe8-825a-4cb6-bf87-58151959a9e9 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\74d4e44e-77c1-4126-bf90-f94a4b9a7527 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\8506ad2a-5b6f-4a25-a6d3-6de4036fcbb9 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\875a279a-54c8-46e6-869a-0003e200a1c7 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\8a0532a9-1b83-4c7e-90fa-0826ae6cda82 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\b6445e49-6fc7-42c5-8a4b-d160f66d083c Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\c1fe726c-70cf-4864-8180-8186646f29ae Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\d2151a4e-bd7b-447c-b739-6a5e8bc0edf3 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\d5234b78-c9d1-4f68-b02c-6a4882e1cc2b Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\d9eb33a7-b9d1-4e81-875f-2a677cee4448 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\db51576a-226e-4b08-b6d1-66455615fee7 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-2244424893-2629147862-639317376-1005\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-3692273407-2273381536-4023909579-500\b8f79699-87ba-4595-ae03-a88c547a58fe Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-3692273407-2273381536-4023909579-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-430614108-2175211297-1803647944-500\e644ca1f-f319-4106-8aa8-bafd3037ffdb Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\Protect\S-1-5-21-430614108-2175211297-1803647944-500\Preferred Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\SystemCertificates\My\Certificates\3B341C1C42982CEF217F884DA5DB12033DABFC36 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\SystemCertificates\My\Certificates\B7A0DE8DB05F62AD72F1578D5FF7B958F557A6AB Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\SystemCertificates\My\Keys\076663BE411A0F474409CA2217FEC3EDA4B22702 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\Microsoft\SystemCertificates\My\Keys\FE050D4DFC22D47BD1C42242B7FC1E0D0D2C9772 Status: Hidden


Suspect File: C:\RRbackups\Documents and Settings\Tom\Application Data\ThinkVantage\Client Security\hibernation.dat Status: Hidden


Suspect File: C:\RRbackups\hints.dat Status: Hidden


Suspect File: C:\RRbackups\regcerts.dat Status: Hidden


Suspect File: C:\RRbackups\rr.log Status: Hidden


Suspect File: C:\RRbackups\SAM Status: Hidden


Suspect File: C:\RRbackups\system Status: Hidden


Suspect File: C:\RRbackups\system.dat Status: Hidden


Suspect File: C:\RRbackups\tvt.txt Status: Hidden


Suspect File: C:\RRbackups\usersids.dat Status: Hidden

==============================================
>Hooks

[324]explorer.exe-->kernel32.dll-->GetProcAddress, Type: IAT modification at address 0x01001268 hook handler located in [shimeng.dll]
[3572]iexplore.exe-->user32.dll-->DialogBoxIndirectParamA, Type: Inline - RelativeJump at address 0x7E456D7D hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->DialogBoxIndirectParamW, Type: Inline - RelativeJump at address 0x7E432072 hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->DialogBoxParamA, Type: Inline - RelativeJump at address 0x7E43B144 hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->DialogBoxParamW, Type: Inline - RelativeJump at address 0x7E4247AB hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->MessageBoxExA, Type: Inline - RelativeJump at address 0x7E45085C hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->MessageBoxExW, Type: Inline - RelativeJump at address 0x7E450838 hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->MessageBoxIndirectA, Type: Inline - RelativeJump at address 0x7E43A082 hook handler located in [ieframe.dll]
[3572]iexplore.exe-->user32.dll-->MessageBoxIndirectW, Type: Inline - RelativeJump at address 0x7E4664D5 hook handler located in [ieframe.dll]
hamiltonjoe1950
Active Member
 
Posts: 14
Joined: August 27th, 2010, 9:13 pm

Re: Please wait while windows configures symantic antivirus

Unread postby deltalima » September 5th, 2010, 7:02 am

Hi hamiltonjoe1950,

TFC

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • Click the Start button in the bottom left of TFC
  • If prompted, click "Yes" to reboot.

Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It should not take longer than a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

MBRCheck

Please download MBRCheck.exe to your desktop.
  • Double-click on MBRCheck.exe to run it.
  • It will show a Black screen with some information.
  • if an unknown bootcode is found you will have further options available to you, at this time press N then press Enter twice.
  • If nothing unusual is found just press Enter
  • A .txt file named MBRCheck_mm.dd.yy_hh.mm.ss should appear on your desktop.
  • Please post the contents of that file in you're next reply.

Please go to Kaspersky website and perform an online antivirus scan.

  1. Read through the requirements and privacy statement and click on Accept button.
  2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  3. When the downloads have finished, click on Settings.
  4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
      Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
  5. Click on My Computer under Scan.
  6. Once the scan is complete, it will display the results. Click on View Scan Report.
  7. You will see a list of infected items there. Click on Save Report As....
  8. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
  9. Please post this log in your next reply.
User avatar
deltalima
Admin/Teacher
Admin/Teacher
 
Posts: 7614
Joined: February 28th, 2009, 4:38 pm
Location: UK

Re: Please wait while windows configures symantic antivirus

Unread postby hamiltonjoe1950 » September 6th, 2010, 8:38 am

I am posting the MBR and Kapersky reports. I do not know what TFC is or where to acquire it.

MBRCheck, version 1.2.3
(c) 2010, AD

Command-line:
Windows Version: Windows XP Professional
Windows Information: Service Pack 3 (build 2600)
Logical Drives Mask: 0x00000004

Kernel Drivers (total 157):
0x804D7000 \WINDOWS\system32\ntkrnlpa.exe
0x806E4000 \WINDOWS\system32\hal.dll
0xF8A34000 \WINDOWS\system32\KDCOM.DLL
0xF8944000 \WINDOWS\system32\BOOTVID.dll
0xF8405000 ACPI.sys
0xF8A36000 \WINDOWS\system32\DRIVERS\WMILIB.SYS
0xF83F4000 pci.sys
0xF8534000 isapnp.sys
0xF8948000 compbatt.sys
0xF894C000 \WINDOWS\system32\DRIVERS\BATTC.SYS
0xF8AFC000 pciide.sys
0xF87B4000 \WINDOWS\system32\DRIVERS\PCIIDEX.SYS
0xF83D6000 pcmcia.sys
0xF8544000 MountMgr.sys
0xF83B7000 ftdisk.sys
0xF8A38000 dmload.sys
0xF8391000 dmio.sys
0xF87BC000 PartMgr.sys
0xF8950000 ACPIEC.sys
0xF8AFD000 \WINDOWS\system32\DRIVERS\OPRGHDLR.SYS
0xF837C000 Shockprf.sys
0xF8554000 VolSnap.sys
0xF8364000 atapi.sys
0xF828E000 iaStor.sys
0xF8564000 disk.sys
0xF8574000 \WINDOWS\system32\DRIVERS\CLASSPNP.SYS
0xF826E000 fltmgr.sys
0xF825C000 sr.sys
0xF8584000 PxHelp20.sys
0xF8245000 KSecDD.sys
0xF81B8000 Ntfs.sys
0xF818B000 NDIS.sys
0xF8594000 ohci1394.sys
0xF85A4000 \WINDOWS\system32\DRIVERS\1394BUS.SYS
0xF8171000 Mup.sys
0xF85D4000 \SystemRoot\system32\DRIVERS\nic1394.sys
0xF7D56000 \SystemRoot\system32\DRIVERS\intelppm.sys
0xF79D8000 \SystemRoot\system32\DRIVERS\ialmnt5.sys
0xF79C4000 \SystemRoot\system32\DRIVERS\VIDEOPRT.SYS
0xF799C000 \SystemRoot\system32\DRIVERS\HDAudBus.sys
0xF7970000 \SystemRoot\system32\DRIVERS\e1e5132.sys
0xF7813000 \SystemRoot\system32\DRIVERS\w39n51.sys
0xF883C000 \SystemRoot\system32\DRIVERS\usbuhci.sys
0xF77EF000 \SystemRoot\system32\DRIVERS\USBPORT.SYS
0xF8844000 \SystemRoot\system32\DRIVERS\usbehci.sys
0xF77DB000 \SystemRoot\system32\DRIVERS\sdbus.sys
0xF7D46000 \SystemRoot\system32\DRIVERS\i8042prt.sys
0xF884C000 \SystemRoot\system32\DRIVERS\kbdclass.sys
0xF8A0C000 \SystemRoot\system32\DRIVERS\tp4track.sys
0xF8854000 \SystemRoot\system32\DRIVERS\mouclass.sys
0xF885C000 \SystemRoot\system32\DRIVERS\nscirda.sys
0xF8A10000 \SystemRoot\system32\DRIVERS\irenum.sys
0xF8864000 \SystemRoot\system32\DRIVERS\atmeltpm.sys
0xF8A18000 \SystemRoot\system32\DRIVERS\CmBatt.sys
0xF8A1C000 \SystemRoot\system32\DRIVERS\ibmpmdrv.sys
0xF8B81000 \SystemRoot\system32\DRIVERS\audstub.sys
0xF8A9C000 \SystemRoot\System32\Drivers\RootMdm.sys
0xF886C000 \SystemRoot\System32\Drivers\Modem.SYS
0xF8874000 \SystemRoot\system32\DRIVERS\rasirda.sys
0xF887C000 \SystemRoot\system32\DRIVERS\TDI.SYS
0xF7D36000 \SystemRoot\system32\DRIVERS\rasl2tp.sys
0xF8A24000 \SystemRoot\system32\DRIVERS\ndistapi.sys
0xF77C4000 \SystemRoot\system32\DRIVERS\ndiswan.sys
0xF7D26000 \SystemRoot\system32\DRIVERS\raspppoe.sys
0xF7D16000 \SystemRoot\system32\DRIVERS\raspptp.sys
0xF77B3000 \SystemRoot\system32\DRIVERS\psched.sys
0xF86E4000 \SystemRoot\system32\DRIVERS\msgpc.sys
0xF8884000 \SystemRoot\system32\DRIVERS\ptilink.sys
0xF888C000 \SystemRoot\system32\DRIVERS\raspti.sys
0xF8894000 \SystemRoot\system32\DRIVERS\wanatw4.sys
0xF889C000 \SystemRoot\system32\DRIVERS\RimSerial.sys
0xF7783000 \SystemRoot\system32\DRIVERS\rdpdr.sys
0xF86F4000 \SystemRoot\system32\DRIVERS\termdd.sys
0xF8A9E000 \SystemRoot\system32\DRIVERS\swenum.sys
0xF7760000 \SystemRoot\system32\DRIVERS\ks.sys
0xF7702000 \SystemRoot\system32\DRIVERS\update.sys
0xF8141000 \SystemRoot\system32\DRIVERS\mssmbios.sys
0xF8714000 \SystemRoot\System32\Drivers\NDProxy.SYS
0xA4EE9000 \SystemRoot\system32\drivers\ADIHdAud.sys
0xA4EC5000 \SystemRoot\system32\drivers\portcls.sys
0xA6043000 \SystemRoot\system32\drivers\drmk.sys
0xA4E9F000 \SystemRoot\system32\drivers\AEAudio.sys
0xA4E65000 \SystemRoot\system32\DRIVERS\hsxhwazl.sys
0xA4D6E000 \SystemRoot\system32\DRIVERS\hsx_dpv.sys
0xA4CB8000 \SystemRoot\system32\DRIVERS\hsx_cnxt.sys
0xA6003000 \SystemRoot\system32\DRIVERS\usbhub.sys
0xA4819000 \SystemRoot\system32\DRIVERS\USBD.SYS
0xAA4F5000 \SystemRoot\System32\Drivers\i2omgmt.SYS
0xA46E9000 \??\C:\Program Files\Symantec AntiVirus\savrt.sys
0xA46CC000 \??\C:\Program Files\Symantec\SYMEVENT.SYS
0xA46B8000 \??\C:\Program Files\Symantec AntiVirus\Savrtpel.sys
0xA4576000 \??\C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20100402.004\navex15.sys
0xA4562000 \??\C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20100402.004\naveng.sys
0xA47AF000 \SystemRoot\System32\Drivers\Fs_Rec.SYS
0xF8BFB000 \SystemRoot\System32\Drivers\Null.SYS
0xA4815000 \SystemRoot\System32\Drivers\Beep.SYS
0xA0BB6000 \SystemRoot\system32\DRIVERS\HIDPARSE.SYS
0xA0BAE000 \SystemRoot\System32\drivers\vga.sys
0xA3F06000 \SystemRoot\System32\Drivers\mnmdd.SYS
0xA3F04000 \SystemRoot\System32\DRIVERS\RDPCDD.sys
0xA399D000 \SystemRoot\System32\Drivers\Msfs.SYS
0xA396D000 \SystemRoot\System32\Drivers\Npfs.SYS
0xA0453000 \SystemRoot\system32\DRIVERS\rasacd.sys
0x9F7B9000 \SystemRoot\system32\DRIVERS\ipsec.sys
0x9F760000 \SystemRoot\system32\DRIVERS\tcpip.sys
0x9F720000 \SystemRoot\System32\Drivers\SYMTDI.SYS
0x9F6FA000 \SystemRoot\system32\DRIVERS\ipnat.sys
0xF8644000 \SystemRoot\system32\DRIVERS\wanarp.sys
0x9F6D2000 \SystemRoot\system32\DRIVERS\netbt.sys
0xF8674000 \SystemRoot\system32\DRIVERS\arp1394.sys
0x9F6B0000 \SystemRoot\System32\drivers\afd.sys
0xF86C4000 \SystemRoot\system32\DRIVERS\netbios.sys
0xA9CEB000 \SystemRoot\System32\drivers\TSMAPIP.SYS
0xA9CE3000 \SystemRoot\System32\drivers\Tppwrif.sys
0xA917F000 \SystemRoot\System32\Drivers\TPHKDRV.SYS
0xA9177000 \SystemRoot\System32\drivers\TDSMAPI.SYS
0xA916F000 \SystemRoot\System32\drivers\Smapint.sys
0xA47DB000 \SystemRoot\System32\Drivers\ShockMgr.SYS
0x9F665000 \SystemRoot\system32\DRIVERS\rdbss.sys
0x9F5F5000 \SystemRoot\system32\DRIVERS\mrxsmb.sys
0xA47CF000 \??\C:\WINDOWS\system32\Drivers\IBMBLDID.sys
0xA9D8D000 \SystemRoot\System32\Drivers\Fips.SYS
0x9F597000 \??\C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys
0xF7B37000 \SystemRoot\System32\drivers\ANC.SYS
0x99FCC000 \SystemRoot\System32\Drivers\dump_iaStor.sys
0xBF800000 \SystemRoot\System32\win32k.sys
0xAA4ED000 \SystemRoot\System32\drivers\Dxapi.sys
0x9AA1A000 \SystemRoot\System32\watchdog.sys
0xBF000000 \SystemRoot\System32\drivers\dxg.sys
0x9A8CC000 \SystemRoot\System32\drivers\dxgthk.sys
0xBF020000 \SystemRoot\System32\ialmdnt5.dll
0xBF012000 \SystemRoot\System32\ialmrnt5.dll
0xBF042000 \SystemRoot\System32\ialmdev5.DLL
0xBF077000 \SystemRoot\System32\ialmdd5.DLL
0xF88AC000 \SystemRoot\system32\DRIVERS\AegisP.sys
0x99FB6000 \SystemRoot\system32\DRIVERS\irda.sys
0xA0457000 \SystemRoot\system32\DRIVERS\s24trans.sys
0xBFFA0000 \SystemRoot\System32\ATMFD.DLL
0x9A998000 \SystemRoot\system32\DRIVERS\ndisuio.sys
0x99ED9000 \SystemRoot\system32\drivers\wdmaud.sys
0xA1B2A000 \SystemRoot\system32\drivers\sysaudio.sys
0x99BAE000 \SystemRoot\system32\DRIVERS\mrxdav.sys
0x9A9FA000 \SystemRoot\system32\DRIVERS\PROCDD.SYS
0xA04C5000 \??\C:\WINDOWS\SYSTEM32\EGATHDRV.SYS
0x99AAE000 \??\C:\WINDOWS\system32\drivers\ibmfilter.sys
0x9ADB3000 \SystemRoot\system32\DRIVERS\mdmxsdk.sys
0xA47D9000 \??\C:\WINDOWS\System32\drivers\pmemnt.sys
0x99C3B000 \??\C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\PrivateDiskM.sys
0x9984D000 \SystemRoot\system32\DRIVERS\srv.sys
0xF8C2B000 \??\C:\Program Files\SMI2\smi2.sys
0x9971D000 \??\C:\WINDOWS\system32\drivers\tmcomm.sys
0x99301000 \SystemRoot\System32\Drivers\HTTP.sys
0x99841000 \SystemRoot\system32\DRIVERS\hidusb.sys
0x99904000 \SystemRoot\system32\DRIVERS\HIDCLASS.SYS
0x9911D000 \SystemRoot\system32\DRIVERS\mouhid.sys
0x989DA000 \SystemRoot\system32\drivers\kmixer.sys
0x7C900000 \WINDOWS\system32\ntdll.dll

Processes (total 66):
0 System Idle Process
4 System
968 C:\WINDOWS\system32\smss.exe
1020 csrss.exe
1044 C:\WINDOWS\system32\winlogon.exe
1088 C:\WINDOWS\system32\services.exe
1100 C:\WINDOWS\system32\lsass.exe
1252 C:\WINDOWS\system32\ibmpmsvc.exe
1280 C:\WINDOWS\system32\svchost.exe
1340 svchost.exe
1380 C:\WINDOWS\system32\svchost.exe
1432 C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
1556 C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
1680 svchost.exe
1756 svchost.exe
212 C:\WINDOWS\system32\spoolsv.exe
356 C:\WINDOWS\explorer.exe
768 C:\WINDOWS\system32\tp4serv.exe
832 C:\WINDOWS\system32\TpShocks.exe
864 C:\WINDOWS\system32\hkcmd.exe
492 C:\WINDOWS\system32\igfxpers.exe
960 C:\PROGRA~1\ThinkPad\UTILIT~1\EZEJMNAP.EXE
1024 C:\PROGRA~1\Lenovo\PkgMgr\HOTKEY\TPHKMGR.exe
1424 C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.EXE
1428 C:\Program Files\IBM ThinkVantage\Client Security Solution\cssauth.exe
1472 C:\Program Files\Lenovo\PkgMgr\HOTKEY\TPONSCR.exe
644 C:\Program Files\Lenovo\PkgMgr\HOTKEY_1\TpScrex.exe
648 C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe
676 C:\Program Files\ThinkPad\ConnectUtilities\ACTray.exe
684 C:\Program Files\ThinkPad\ConnectUtilities\ACWLIcon.exe
720 C:\WINDOWS\system32\rundll32.exe
756 C:\Program Files\Common Files\aol\1168475224\ee\aolsoftware.exe
1312 C:\Program Files\Analog Devices\Core\smax4pnp.exe
1532 C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
1588 C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
1600 C:\Program Files\Microsoft ActiveSync\wcescomm.exe
1608 C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
1632 C:\Program Files\WORDsearch 7\ZipScript.exe
1696 C:\WINDOWS\system32\ctfmon.exe
1996 svchost.exe
332 C:\PROGRA~1\MICROS~3\rapimgr.exe
552 C:\WINDOWS\system32\IPSSVC.EXE
600 C:\Program Files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
584 C:\Program Files\Digital Line Detect\DLG.exe
1652 C:\Documents and Settings\Tom\Local Settings\Application Data\Autobahn\mlb-nexdef-autobahn.exe
860 C:\Program Files\Common Files\aol\acs\AOLacsd.exe
1928 C:\Program Files\Common Files\Microsoft Shared\VS7Debug\MDM.EXE
2112 C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
2744 C:\WINDOWS\system32\svchost.exe
2860 C:\WINDOWS\system32\TPHDEXLG.exe
2872 C:\WINDOWS\system32\TpKmpSvc.exe
2892 ibmtcsd.exe
2916 C:\Program Files\IBM ThinkVantage\Rescue and Recovery\rrservice.exe
2960 C:\Program Files\IBM ThinkVantage\Common\Scheduler\tvtsched.exe
2988 C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
3084 wdfmgr.exe
3224 C:\Program Files\ThinkPad\ConnectUtilities\AcSvc.exe
3464 C:\WINDOWS\system32\wuauclt.exe
3396 alg.exe
3884 C:\Program Files\IBM ThinkVantage\Common\Logger\logmon.exe
3592 C:\Program Files\ThinkPad\ConnectUtilities\SvcGuiHlpr.exe
2696 C:\WINDOWS\system32\svchost.exe
3532 C:\Program Files\Internet Explorer\iexplore.exe
2484 C:\Program Files\Java\jre1.6.0_07\bin\jucheck.exe
628 C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
3804 C:\Documents and Settings\Tom\Desktop\MBRCheck.exe

\\.\C: --> \\.\PhysicalDrive0 at offset 0x00000000`00007e00 (NTFS)

PhysicalDrive0 Model Number: FUJITSUMHV2060BH, Rev: 00840028

Size Device Name MBR Status
--------------------------------------------
55 GB \\.\PhysicalDrive0 Unknown MBR code
SHA1: 05F5A8FB77EF88BA79A35A22B2DE8815F76C2384


Found non-standard or infected MBR.
Enter 'Y' and hit ENTER for more options, or 'N' to exit:
--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Monday, September 6, 2010
Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Sunday, September 05, 2010 19:45:46
Records in database: 4192638
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
C:\

Scan statistics:
Objects scanned: 127205
Threats found: 13
Infected objects found: 23
Suspicious objects found: 0
Scan duration: 07:24:22


File name / Threat / Threats count
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\02440000\4AC5D066.VBN Infected: Trojan.Win32.BHO.fdd 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\05E40000\4DE79F6C.VBN Infected: Exploit.JS.Pdfka.hg 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\06000000\4ECC40CA.VBN Infected: Trojan.Win32.BHO.fdd 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\09480000\4BEA3ACF.VBN Infected: Trojan-Downloader.Win32.BHO.rz 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0C280000\4DAA8379.VBN Infected: Exploit.HTML.IESlice.bt 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0C340000\4D3779DD.VBN Infected: Exploit.Win32.Pidief.no 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0C700000\4CF67CF2.VBN Infected: Exploit.JS.Pdfka.w 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0E140000.VBN Infected: Packed.Win32.Krap.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0E140001.VBN Infected: Packed.Win32.Krap.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0E580001.VBN Infected: Trojan-Downloader.Win32.Zlob.dxm 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0E580002.VBN Infected: Trojan-Downloader.Win32.Zlob.dxh 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0EB80000\4EF81896.VBN Infected: Trojan-Downloader.Win32.BHO.rz 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0EB80001\4EF81910.VBN Infected: Trojan-Downloader.Win32.BHO.rz 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0EB80002\4EF819B5.VBN Infected: Trojan-Downloader.Win32.BHO.rz 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0EB80003\4EF81A0D.VBN Infected: Trojan-Downloader.Win32.BHO.rz 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0FA40000\4FA52F4D.VBN Infected: Exploit.JS.Pdfka.t 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\10300000.VBN Infected: Trojan-Downloader.Java.OpenStream.ac 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\10300001.VBN Infected: Trojan-Downloader.Java.OpenStream.ac 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\12080000.VBN Infected: Trojan-Downloader.Win32.FraudLoad.vagi 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\15380000.VBN Infected: Exploit.Java.ByteVerify 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\15380001.VBN Infected: Exploit.Java.ByteVerify 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\15380002.VBN Infected: Trojan-Downloader.Win32.FraudLoad.vagi 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\15380003.VBN Infected: Trojan-Downloader.Win32.FraudLoad.vagi 1

Selected area has been scanned.
hamiltonjoe1950
Active Member
 
Posts: 14
Joined: August 27th, 2010, 9:13 pm

Re: Please wait while windows configures symantic antivirus

Unread postby deltalima » September 6th, 2010, 8:49 am

Hi hamiltonjoe1950,

Infected objects found: 23


Those detections are all in the Symantech Quarantine folder and so are safe.

All scans are clean and so my recommendation is to remove Symantech and replace with one of the free antivirus programs.

Here are some more suggestions to help keep the computer clean.

You should Download and Install the newest version of Adobe Reader for reading pdf files, due to the vulnerabilities in earlier versions.
All versions numbered lower than 9.3 are vulnerable.
  • Go HERE, UNCHECK any Free Add-Ons, and click Download to install the latest version of Adobe Acrobat Reader.
  • After it completes the Installation, close the Download Manager.

Update Java Runtime
You are using an old version of Java. Sun's Java is sometimes updated in order to eliminate the exploitation of vulnerabilities in an existing version. For this reason, it's extremely important that you keep the program up to date, & also remove the older more vulnerable versions from your system. The most current version of Sun Java is: Java Runtime Environment Version 6 Update 21.
  • Download the latest version of Java Runtime Environment (JRE) 6 Here
  • Scroll down to where it says "JDK 6 Update 21 (JDK or JRE)"
  • Click the orange Download JRE button to the right
  • Select the Windows platform from the dropdown menu
  • Read the License Agreement and then check the box that says: "I agree to the Java SE Runtime Environment 6 with JavaFX License Agreement". Click on Continue.The page will refresh
  • Click on the link to download Windows Offline Installation & save the file to your desktop
  • Close any programs you may have running - especially your web browser
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs & remove all older versions of Java
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE or Java(TM) 6) in the name
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions
  • Reboot your computer once all Java components are removed
  • Then from your desktop double-click on jre-6u21-windows-i586-p.exe to install the newest version

Clean up with OTL

  • Double-click OTL.exe to start the program. This will remove all the tools we used to clean your pc.
  • Close all other programs apart from OTL as this step will require a reboot
  • On the OTL main screen, press the CleanUp! button
  • Say Yes to the prompt and then allow the program to reboot your computer.


Update your AntiVirus Software and keep your other programs up-to-date
Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.
You can use one of these sites to check if any updates are needed for your pc.
Secunia Software Inspector
F-secure Health Check

IMPORTANT – you Urgently need to update Internet Exporer to version 8

Security Updates for Windows, Internet Explorer & Microsoft Office
Whenever a security problem in its software is found, Microsoft will usually create a patch so that after the patch is installed, attackers can't use the vulnerability to install malicious software on your PC. Keeping up with these patches will help to prevent malicious software being installed on your PC. Ensure you are registered for Windows updates via Start > right-click on My Computer > Properties > Automatic Updates tab or visit the Microsoft Update site on a regular basis.


Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

A tutorial on installing & using this product can be found here:

Using SpywareBlaster to protect your computer from Spyware and Malware


Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety


Also, please read this great article by Tony Klein So How Did I Get Infected In First Place

Happy surfing and stay clean!
User avatar
deltalima
Admin/Teacher
Admin/Teacher
 
Posts: 7614
Joined: February 28th, 2009, 4:38 pm
Location: UK

Re: Please wait while windows configures symantic antivirus

Unread postby hamiltonjoe1950 » September 6th, 2010, 10:39 am

Thank you for the suggestions. I will be updating Java and to Internet Explorer 8 and will run OTl as suggested.

I'm still not sure what I can do about Symantec AV since I have no "Uninstall" Option, there is no uninstall in folder, etc. I will try to contact where I bought the computer and see if they can help with that as I prefer getting it off my computer.
hamiltonjoe1950
Active Member
 
Posts: 14
Joined: August 27th, 2010, 9:13 pm

Re: Please wait while windows configures symantic antivirus

Unread postby deltalima » September 6th, 2010, 10:51 am

Ok, you are welcome!

Removing Symantech can be difficult and really does need to be done by the company who installed it. The other option would be to contact Symantech for help.

Good luck.
User avatar
deltalima
Admin/Teacher
Admin/Teacher
 
Posts: 7614
Joined: February 28th, 2009, 4:38 pm
Location: UK

Re: Please wait while windows configures symantic antivirus

Unread postby Elrond » September 7th, 2010, 9:05 am

hamiltonjoe1950 this topic is now closed.

We are pleased we could help you resolve your computer's malware issues.

If you would like to make a comment or leave a compliment regarding the help you have received, please see Feedback for Our Helpers - Say "Thanks" Here.
User avatar
Elrond
Admin/Teacher Emeritus
 
Posts: 8818
Joined: February 17th, 2005, 9:14 pm
Location: Jerusalem
Advertisement
Register to Remove

Previous

  • Similar Topics
    Replies
    Views
    Last post

Return to Infected? Virus, malware, adware, ransomware, oh my!



Who is online

Users browsing this forum: No registered users and 42 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware