Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help! bizrate virus and video pop ups on google chrome!!


  • Please log in to reply
22 replies to this topic

#1 deedee0496

deedee0496

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 02 July 2013 - 11:49 PM

Hello I'm new to this site and I need help removing adware, viruses etc. When I open up google chrome a bizrate window automatically pops up and on the google homepage videos pop up. I ran malwarebytes anti-malware and it found 5 adware files but this still keeps happening. Also the computer is running extremely slow! I'm running Windows 7 Dell Inspirion 530.

 

Thanks

Deanna



BC AdBot (Login to Remove)

 


#2 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:10:32 PM

Posted 03 July 2013 - 12:44 AM

Hello deedee and Welcome -

 

:step1: Please download MiniToolBox, Save it to your desktop and run it.
Close any Firefox browsers you may have open
Checkmark the following boxes:
•Flush DNS
•Report IE Proxy Settings
•Reset IE Proxy Settings
•Report FF Proxy Settings
•Reset FF Proxy Settings
•List content of Hosts
•List IP configuration
•List last 10 Event Viewer log
•List Installed Programs
•List Users, Partitions and Memory size.
•List Minidump Files
 Click Go and copy / paste the result (Result.txt).

 

 

:step2: Download Security Check by Screen317 from HERE
* Save it to your Desktop.
* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.
Note: If a security program requests permission to access the Internet, allow it to do so.

 

 

If you have any of the listed programs installed, pllease Update them prior to any scan -

 

:step3: Download Malwarebytes' Anti-Malware Free (aka MBAM)
* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.
Be sure to reboot the computer after you post the log.

 

 

:step4: Download SUPERAntiSpyware Free (aka SAS)
* Double-click SAS -setup.exe and follow the prompts to install the program.
* At the end, be sure to Check for Updates to be sure it is current
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to reboot the computer after you post the log.

 

 

Thank You -



#3 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 03 July 2013 - 01:24 AM

MiniToolBox by Farbar  Version: 16-06-2013
Ran by ken (administrator) on 03-07-2013 at 02:05:14
Running from "G:\Users\ken\Desktop"
Windows 7 Ultimate  (X64)
Boot Mode: Normal
***************************************************************************
 
========================= Flush DNS: ===================================
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========================= IE Proxy Settings: ============================== 
 
Proxy is not enabled.
No Proxy Server is set.
 
"Reset IE Proxy Settings": IE Proxy Settings were reset.
 
========================= FF Proxy Settings: ============================== 
 
 
"Reset FF Proxy Settings": Firefox Proxy settings were reset.
 
========================= Hosts content: =================================
 
 
 
========================= IP Configuration: ================================
 
Realtek RTL8169/8110 Family PCI Gigabit Ethernet NIC (NDIS 6.20) = Local Area Connection 2 (Connected)
VMware Virtual Ethernet Adapter for VMnet8 = VMware Network Adapter VMnet8 (Connected)
VMware Virtual Ethernet Adapter for VMnet1 = VMware Network Adapter VMnet1 (Hardware not present)
Intel® 82562V-2 10/100 Network Connection = Local Area Connection (Media disconnected)
 
 
# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
 
reset
set global icmpredirects=enabled
add address name="VMware Network Adapter VMnet1" address=192.168.65.1
 
 
popd
# End of IPv4 configuration
 
 
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : Parent-PC
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : Belkin
 
Ethernet adapter Local Area Connection 2:
 
   Connection-specific DNS Suffix  . : Belkin
   Description . . . . . . . . . . . : Realtek RTL8169/8110 Family PCI Gigabit Ethernet NIC (NDIS 6.20)
   Physical Address. . . . . . . . . : E0-91-F5-21-E6-C0
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::48fb:195e:8ca5:7f19%13(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.2.2(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Tuesday, July 02, 2013 8:11:08 AM
   Lease Expires . . . . . . . . . . : Saturday, August 09, 2149 8:33:37 AM
   Default Gateway . . . . . . . . . : 192.168.2.1
   DHCP Server . . . . . . . . . . . : 192.168.2.1
   DHCPv6 IAID . . . . . . . . . . . : 316707317
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-15-00-AB-2D-00-1D-09-87-7D-F3
   DNS Servers . . . . . . . . . . . : 192.168.2.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Local Area Connection:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : Belkin
   Description . . . . . . . . . . . : Intel® 82562V-2 10/100 Network Connection
   Physical Address. . . . . . . . . : 00-1D-09-87-7D-F3
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Ethernet adapter VMware Network Adapter VMnet8:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8
   Physical Address. . . . . . . . . : 00-50-56-C0-00-08
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::c437:8147:f622:f221%18(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.127.1(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Tuesday, July 02, 2013 8:11:09 AM
   Lease Expires . . . . . . . . . . : Wednesday, July 03, 2013 2:26:09 AM
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 192.168.127.254
   DHCPv6 IAID . . . . . . . . . . . : 419450966
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-15-00-AB-2D-00-1D-09-87-7D-F3
   DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
                                       fec0:0:0:ffff::2%1
                                       fec0:0:0:ffff::3%1
   Primary WINS Server . . . . . . . : 192.168.127.2
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Tunnel adapter isatap.Belkin:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : Belkin
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter isatap.{CFB042EC-E2F9-4E62-A3CF-5B44E0FDCE3B}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter Local Area Connection* 9:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  router.belkin
Address:  192.168.2.1
 
Name:    google.com
Addresses:  2607:f8b0:4006:801::1009
 74.125.226.228
 74.125.226.229
 74.125.226.230
 74.125.226.231
 74.125.226.232
 74.125.226.233
 74.125.226.238
 74.125.226.224
 74.125.226.225
 74.125.226.226
 74.125.226.227
 
 
Pinging google.com [74.125.226.228] with 32 bytes of data:
Reply from 74.125.226.228: bytes=32 time=22ms TTL=49
Reply from 74.125.226.228: bytes=32 time=21ms TTL=49
 
Ping statistics for 74.125.226.228:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 21ms, Maximum = 22ms, Average = 21ms
Server:  router.belkin
Address:  192.168.2.1
 
Name:    yahoo.com
Addresses:  206.190.36.45
 98.138.253.109
 98.139.183.24
 
 
Pinging yahoo.com [206.190.36.45] with 32 bytes of data:
Reply from 206.190.36.45: bytes=32 time=86ms TTL=45
Reply from 206.190.36.45: bytes=32 time=87ms TTL=45
 
Ping statistics for 206.190.36.45:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 86ms, Maximum = 87ms, Average = 86ms
 
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
 
Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
 13...e0 91 f5 21 e6 c0 ......Realtek RTL8169/8110 Family PCI Gigabit Ethernet NIC (NDIS 6.20)
 11...00 1d 09 87 7d f3 ......Intel® 82562V-2 10/100 Network Connection
 18...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8
  1...........................Software Loopback Interface 1
 12...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
 14...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
 20...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.2.1      192.168.2.2     10
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.2.0    255.255.255.0         On-link       192.168.2.2    266
      192.168.2.2  255.255.255.255         On-link       192.168.2.2    266
    192.168.2.255  255.255.255.255         On-link       192.168.2.2    266
    192.168.127.0    255.255.255.0         On-link     192.168.127.1    276
    192.168.127.1  255.255.255.255         On-link     192.168.127.1    276
  192.168.127.255  255.255.255.255         On-link     192.168.127.1    276
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link       192.168.2.2    266
        224.0.0.0        240.0.0.0         On-link     192.168.127.1    276
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link       192.168.2.2    266
  255.255.255.255  255.255.255.255         On-link     192.168.127.1    276
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    306 ::1/128                  On-link
 13    266 fe80::/64                On-link
 18    276 fe80::/64                On-link
 13    266 fe80::48fb:195e:8ca5:7f19/128
                                    On-link
 18    276 fe80::c437:8147:f622:f221/128
                                    On-link
  1    306 ff00::/8                 On-link
 13    266 ff00::/8                 On-link
 18    276 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
 
========================= Event log errors: ===============================
 
Application errors:
==================
Error: (07/03/2013 02:05:02 AM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x13ec
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/03/2013 01:05:01 AM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0xc3c
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/03/2013 00:05:01 AM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x1070
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 11:05:01 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x574
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 10:05:00 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x89c
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 09:05:00 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0xcec
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 08:05:00 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x1180
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 07:05:00 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x1188
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 06:05:00 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0x1384
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
Error: (07/02/2013 05:05:00 PM) (Source: Application Error) (User: )
Description: Faulting application name: FlashPlayerUpdateService.exe, version: 11.6.602.180, time stamp: 0x51a4ab8c
Faulting module name: ntdll.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdb3b
Exception code: 0xc0000005
Fault offset: 0x0002e0c3
Faulting process id: 0xc9c
Faulting application start time: 0xFlashPlayerUpdateService.exe0
Faulting application path: FlashPlayerUpdateService.exe1
Faulting module path: FlashPlayerUpdateService.exe2
Report Id: FlashPlayerUpdateService.exe3
 
 
System errors:
=============
Error: (07/02/2013 08:13:43 AM) (Source: Service Control Manager) (User: )
Description: The NVIDIA Update Service Daemon service failed to start due to the following error: 
%%1069
 
Error: (07/02/2013 08:13:43 AM) (Source: Service Control Manager) (User: )
Description: The nvUpdatusService service was unable to log on as .\UpdatusUser with the currently configured password due to the following error: 
%%1330
 
To ensure that the service is configured properly, use the Services snap-in in Microsoft Management Console (MMC).
 
Error: (07/02/2013 08:11:16 AM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load: 
vmm
 
Error: (07/02/2013 08:11:06 AM) (Source: Service Control Manager) (User: )
Description: The dldfCATSCustConnectService service failed to start due to the following error: 
%%1053
 
Error: (07/02/2013 08:11:06 AM) (Source: Service Control Manager) (User: )
Description: A timeout was reached (30000 milliseconds) while waiting for the dldfCATSCustConnectService service to connect.
 
Error: (07/02/2013 07:44:57 AM) (Source: Service Control Manager) (User: )
Description: The NVIDIA Update Service Daemon service failed to start due to the following error: 
%%1069
 
Error: (07/02/2013 07:44:57 AM) (Source: Service Control Manager) (User: )
Description: The nvUpdatusService service was unable to log on as .\UpdatusUser with the currently configured password due to the following error: 
%%1330
 
To ensure that the service is configured properly, use the Services snap-in in Microsoft Management Console (MMC).
 
Error: (07/02/2013 07:42:56 AM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load: 
vmm
 
Error: (07/02/2013 07:42:47 AM) (Source: Service Control Manager) (User: )
Description: The dldfCATSCustConnectService service failed to start due to the following error: 
%%1053
 
Error: (07/02/2013 07:42:47 AM) (Source: Service Control Manager) (User: )
Description: A timeout was reached (30000 milliseconds) while waiting for the dldfCATSCustConnectService service to connect.
 
 
Microsoft Office Sessions:
=========================
Error: (07/03/2013 02:05:02 AM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c313ec01ce77b3402f356bG:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll7f22d3ae-e3a6-11e2-a170-005056c00008
 
Error: (07/03/2013 01:05:01 AM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3c3c01ce77aade6ae06cG:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll1d4529f0-e39e-11e2-a170-005056c00008
 
Error: (07/03/2013 00:05:01 AM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3107001ce77a27ca6782bG:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dllbb804c7d-e395-11e2-a170-005056c00008
 
Error: (07/02/2013 11:05:01 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c357401ce779a1ae1e431G:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll59bb6a62-e38d-11e2-a170-005056c00008
 
Error: (07/02/2013 10:05:00 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c389c01ce7791b91e0de3G:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dllf75e2e14-e384-11e2-a170-005056c00008
 
Error: (07/02/2013 09:05:00 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3cec01ce7789575adffdG:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll959b002e-e37c-11e2-a170-005056c00008
 
Error: (07/02/2013 08:05:00 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3118001ce7780f594cc47G:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll33d51d7a-e374-11e2-a170-005056c00008
 
Error: (07/02/2013 07:05:00 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3118801ce777893d06281G:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dlld21101d5-e36b-11e2-a170-005056c00008
 
Error: (07/02/2013 06:05:00 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3138401ce7770320bdbfbG:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll704d3ea2-e363-11e2-a170-005056c00008
 
Error: (07/02/2013 05:05:00 PM) (Source: Application Error)(User: )
Description: FlashPlayerUpdateService.exe11.6.602.18051a4ab8cntdll.dll6.1.7600.163854a5bdb3bc00000050002e0c3c9c01ce7767d0491e4aG:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeG:\Windows\SysWOW64\ntdll.dll0e893e7c-e35b-11e2-a170-005056c00008
 
 
CodeIntegrity Errors:
===================================
  Date: 2013-07-02 09:55:23.719
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-tpm-driver-wmi_31bf3856ad364e35_6.0.6001.18000_none_6f8d0e60c043c672\Win32_Tpm.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:55:23.719
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-tpm-driver-wmi_31bf3856ad364e35_6.0.6001.18000_none_6f8d0e60c043c672\Win32_Tpm.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:55:23.688
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-tpm-driver-wmi_31bf3856ad364e35_6.0.6001.18000_none_6f8d0e60c043c672\Win32_Tpm.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:55:23.641
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-tpm-driver-wmi_31bf3856ad364e35_6.0.6000.16386_none_6d564c64c358b59e\Win32_Tpm.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:55:23.626
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-tpm-driver-wmi_31bf3856ad364e35_6.0.6000.16386_none_6d564c64c358b59e\Win32_Tpm.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:55:23.610
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-tpm-driver-wmi_31bf3856ad364e35_6.0.6000.16386_none_6d564c64c358b59e\Win32_Tpm.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:48:23.858
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-bcrypt-dll_31bf3856ad364e35_6.0.6002.18005_none_f0780c78ec8773db\bcrypt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:48:23.843
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-bcrypt-dll_31bf3856ad364e35_6.0.6002.18005_none_f0780c78ec8773db\bcrypt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:48:23.827
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-bcrypt-dll_31bf3856ad364e35_6.0.6002.18005_none_f0780c78ec8773db\bcrypt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-07-02 09:48:23.796
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\winsxs\x86_microsoft-windows-bcrypt-dll_31bf3856ad364e35_6.0.6001.18000_none_ee8c936cef65a88f\bcrypt.dll because the set of per-page image hashes could not be found on the system.
 
 
=========================== Installed Programs ============================
 
Active@ File Recovery (Version: 7.5.1)
Adobe Flash Player 11 ActiveX (Version: 11.7.700.224)
Adobe Flash Player 11 Plugin (Version: 11.7.700.224)
Adobe Reader 9.5.2 (Version: 9.5.2)
Animated Snow Desktop Wallpaper 1.2.0
Apple Application Support (Version: 2.3.4)
Apple Mobile Device Support (Version: 6.1.0.13)
Apple Software Update (Version: 2.1.3.127)
Belkin Daily DJ
Belkin Music Labeler
Belkin Setup and Router Monitor
Bit Boost
Bonjour (Version: 3.0.0.10)
CCleaner (Version: 4.03)
Coupon Printer for Windows (Version: 5.0.0.1)
Dell AIO Printer 948
DMUninstaller
DnsBasic 1.0 build 111
FaxRedist (Version: 1.0.0)
FileMenu Tools
Google Chrome (Version: 27.0.1453.116)
Google Update Helper (Version: 1.3.21.145)
Internet TV for Windows Media Center (Version: 4.2.2.0)
iTunes (Version: 11.0.4.4)
Java 7 Update 21 (Version: 7.0.210)
Malwarebytes Anti-Malware version 1.75.0.1300 (Version: 1.75.0.1300)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319)
Microsoft .NET Framework 4 Multi-Targeting Pack (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft Application Error Reporting (Version: 12.0.6015.5000)
Microsoft Expression Blend 3 SDK (Version: 1.0.1343.0)
Microsoft Expression Blend 4 (Version: 4.0.30816.0)
Microsoft Expression Blend 4 Add-in for Adobe FXG Import (Version: 1.0.20817.0)
Microsoft Expression Blend SDK for .NET 4 (Version: 2.0.20525.0)
Microsoft Expression Blend SDK for Silverlight 4 (Version: 2.0.20525.0)
Microsoft Expression Blend SDK for Windows Phone 7 (Version: 2.0.20901.0)
Microsoft Expression Blend SDK for Windows Phone OS 7.1 (Version: 2.0.30816.0)
Microsoft Games for Windows - LIVE Redistributable (Version: 3.2.3.0)
Microsoft Help Viewer 1.1 (Version: 1.1.40219)
Microsoft IntelliPoint 7.1 (Version: 7.10.344.0)
Microsoft Office Access MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Access Setup Metadata MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Excel MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Groove MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office InfoPath MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Office 64-bit Components 2010 (Version: 14.0.4734.1000)
Microsoft Office OneNote MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Outlook MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office PowerPoint MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Professional Plus 2010 (Version: 14.0.4734.1000)
Microsoft Office Proof (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Proof (French) 2010 (Version: 14.0.4734.1000)
Microsoft Office Proof (Spanish) 2010 (Version: 14.0.4734.1000)
Microsoft Office Proofing (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Publisher MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Shared 64-bit MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Shared 64-bit Setup Metadata MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Shared MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Office Word MUI (English) 2010 (Version: 14.0.4734.1000)
Microsoft Silverlight (Version: 4.0.60531.0)
Microsoft Silverlight 3 SDK (Version: 3.0.40818.0)
Microsoft Silverlight 4 SDK (Version: 4.0.60310.0)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.59193)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2010  x64 Runtime - 10.0.40219 (Version: 10.0.40219)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319 (Version: 10.0.30319)
Microsoft Visual Studio 2010 Express Prerequisites x64 - ENU (Version: 10.0.40219)
Microsoft XNA Framework Redistributable 4.0 Refresh (Version: 4.0.30901.0)
Microsoft XNA Game Studio Platform Tools (Version: 1.4.0.0)
Music MasterWorks v3.94
Music Mover
NVIDIA 3D Vision Controller Driver 306.97 (Version: 306.97)
NVIDIA 3D Vision Driver 306.97 (Version: 306.97)
NVIDIA Control Panel 306.97 (Version: 306.97)
NVIDIA Drivers
NVIDIA Graphics Driver 306.97 (Version: 306.97)
NVIDIA Install Application (Version: 2.1002.85.551)
NVIDIA PhysX (Version: 9.12.0604)
NVIDIA PhysX System Software 9.12.0604 (Version: 9.12.0604)
NVIDIA Stereoscopic 3D Driver (Version: 7.17.13.0697)
NVIDIA Update 1.10.8 (Version: 1.10.8)
NVIDIA Update Components (Version: 1.10.8)
Reason 5.0 (Version: 5.0)
Splashtop Software Updater (Version: 1.5.6.11)
Splashtop Streamer (Version: 2.1.5.2)
Strongvault Online Backup (Version: 2.1.4.0)
System Requirements Lab
UltraStar Deluxe (Version: 1.1)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2468871) (Version: 1)
VLC media player 1.1.10 (Version: 1.1.10)
VMware Workstation (Version: 6.5.3.8888)
Vuze (Version: 4.3)
WinDjView 2.0.1 (Version: 2.0.1)
Windows Mobile Device Updater Component (Version: 04.08.2345.00)
WinRAR 4.00 (64-bit) (Version: 4.00.0)
Wondershare Data Recovery(Build 4.2.0.0) (Version: 4.2.0.0)
WPF Toolkit February 2010 (Version 3.5.50211.1) (Version: 3.5.50211.1)
Zune (Version: 04.08.2345.00)
Zune Language Pack (CHS) (Version: 04.08.2345.00)
Zune Language Pack (CHT) (Version: 04.08.2345.00)
Zune Language Pack (CSY) (Version: 04.08.2345.00)
Zune Language Pack (DAN) (Version: 04.08.2345.00)
Zune Language Pack (DEU) (Version: 04.08.2345.00)
Zune Language Pack (ELL) (Version: 04.08.2345.00)
Zune Language Pack (ESP) (Version: 04.08.2345.00)
Zune Language Pack (FIN) (Version: 04.08.2345.00)
Zune Language Pack (FRA) (Version: 04.08.2345.00)
Zune Language Pack (HUN) (Version: 04.08.2345.00)
Zune Language Pack (IND) (Version: 04.08.2345.00)
Zune Language Pack (ITA) (Version: 04.08.2345.00)
Zune Language Pack (JPN) (Version: 04.08.2345.00)
Zune Language Pack (KOR) (Version: 04.08.2345.00)
Zune Language Pack (MSL) (Version: 04.08.2345.00)
Zune Language Pack (NLD) (Version: 04.08.2345.00)
Zune Language Pack (NOR) (Version: 04.08.2345.00)
Zune Language Pack (PLK) (Version: 04.08.2345.00)
Zune Language Pack (PTB) (Version: 04.08.2345.00)
Zune Language Pack (PTG) (Version: 04.08.2345.00)
Zune Language Pack (RUS) (Version: 04.08.2345.00)
Zune Language Pack (SVE) (Version: 04.08.2345.00)
 
========================= Memory info: ===================================
 
Percentage of memory in use: 50%
Total physical RAM: 2037.18 MB
Available physical RAM: 1002.99 MB
Total Pagefile: 4074.35 MB
Available Pagefile: 2326.28 MB
Total Virtual: 4095.88 MB
Available Virtual: 3973.82 MB
 
========================= Partitions: =====================================
 
1 Drive c: (OS) (Fixed) (Total:138.96 GB) (Free:3.4 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:10 GB) (Free:6.01 GB) NTFS
3 Drive e: (090830_0056) (CDROM) (Total:4.2 GB) (Free:0 GB) UDF
4 Drive f: (OS) (Fixed) (Total:62.22 GB) (Free:2.72 GB) NTFS
5 Drive g: () (Fixed) (Total:458.99 GB) (Free:130.88 GB) NTFS
6 Drive h: (RECOVERY) (Fixed) (Total:9.77 GB) (Free:5.02 GB) NTFS
 
========================= Users: ========================================
 
User accounts for \\PARENT-PC
 
__vmware_user__          Administrator            Extra                    
Guest                    ken                      Mcx1-PARENT-PC           
Parent                   UpdatusUser              
 
========================= Minidump Files ==================================
 
No minidump file found
 
 
**** End of log ****
 
 

 
Results of screen317's Security Check version 0.99.68  
 Windows 7  x64 (UAC is enabled)  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Firewall Enabled!  
 WMI entry may not exist for antivirus; attempting automatic update. 
`````````Anti-malware/Other Utilities Check:````````` 
 Malwarebytes Anti-Malware version 1.75.0.1300  
 Java 7 Update 21  
 Java version out of Date! 
 Adobe Flash Player 11.7.700.224  
 Adobe Reader 9 Adobe Reader out of Date! 
 Google Chrome 27.0.1453.110  
 Google Chrome 27.0.1453.116  
````````Process Check: objlist.exe by Laurent````````  
 Malwarebytes Anti-Malware mbamservice.exe  
 Malwarebytes Anti-Malware mbamgui.exe  
 Malwarebytes' Anti-Malware mbamscheduler.exe   
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive G: 0% 
````````````````````End of Log`````````````````````` 
 
 
 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
 
Database version: v2013.07.03.02
 
Windows 7 x64 NTFS
Internet Explorer 8.0.7600.16385
ken :: PARENT-PC [administrator]
 
7/3/2013 2:17:13 AM
mbam-log-2013-07-03 (02-17-13).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 305511
Time elapsed: 4 minute(s), 18 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)
 

 

 

 



#4 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 03 July 2013 - 01:43 AM

SUPERAntiSpyware Scan Log
 
Generated 07/03/2013 at 02:38 AM
 
Application Version : 5.6.1020
 
Core Rules Database Version : 10582
Trace Rules Database Version: 8394
 
Scan type       : Quick Scan
Total Scan Time : 00:03:44
 
Operating System Information
Windows 7 Ultimate 64-bit (Build 6.01.7600)
UAC On - Limited User
 
Memory items scanned      : 563
Memory threats detected   : 0
Registry items scanned    : 60037
Registry threats detected : 0
File items scanned        : 11654
File threats detected     : 132
 
Adware.Tracking Cookie
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.kontera.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
accounts.google.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.content-ssl.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ru4.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
d.tracksrv.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.la.mediaplayerflv.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.la.mediaplayerflv.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.la.mediaplayerflv.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@intermundomedia[2].txt [ Cookie:parent@intermundomedia.com/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@www.googleadservices[1].txt [ Cookie:parent@www.googleadservices.com/pagead/conversion/1033440352/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@www.google[1].txt [ Cookie:parent@www.google.com/accounts ]
.atdmt.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.atdmt.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@at.atwola[1].txt [ Cookie:parent@at.atwola.com/ ]
.ru4.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.imrworldwide.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@clkads[1].txt [ Cookie:parent@clkads.com/adServe ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@imrworldwide[2].txt [ Cookie:parent@imrworldwide.com/cgi-bin ]
.questionmarket.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.media6degrees.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@zedo[1].txt [ Cookie:parent@zedo.com/ ]
.media6degrees.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.questionmarket.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.questionmarket.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@collective-media[1].txt [ Cookie:parent@collective-media.net/ ]
.ru4.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@fastclick[1].txt [ Cookie:parent@fastclick.net/ ]
.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.imrworldwide.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.mlnadvertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@adform[1].txt [ Cookie:parent@adform.net/ ]
track.adform.net [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@pointroll[2].txt [ Cookie:parent@pointroll.com/ ]
.technoratimedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.technoratimedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@doubleclick[2].txt [ Cookie:parent@doubleclick.net/ ]
.technoratimedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@www.burstnet[2].txt [ Cookie:parent@www.burstnet.com/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@track.adform[2].txt [ Cookie:parent@track.adform.net/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@invitemedia[2].txt [ Cookie:parent@invitemedia.com/ ]
.casalemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.casalemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.casalemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.casalemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.casalemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@network.realmedia[1].txt [ Cookie:parent@network.realmedia.com/ ]
.media6degrees.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@ad.yieldmanager[1].txt [ Cookie:parent@ad.yieldmanager.com/ ]
.legolas-media.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.legolas-media.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.specificclick.net [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.lucidmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@c1.atdmt[1].txt [ Cookie:parent@c1.atdmt.com/ ]
.insightexpressai.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.insightexpressai.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@247realmedia[2].txt [ Cookie:parent@247realmedia.com/ ]
ad.yieldmanager.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@travidia.112.2o7[1].txt [ Cookie:parent@travidia.112.2o7.net/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@clickbooth[1].txt [ Cookie:parent@clickbooth.com/ ]
.at.atwola.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@casalemedia[2].txt [ Cookie:parent@casalemedia.com/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@serving-sys[1].txt [ Cookie:parent@serving-sys.com/ ]
.advertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@realmedia[2].txt [ Cookie:parent@realmedia.com/ ]
.revsci.net [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.pro-market.net [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@specificclick[1].txt [ Cookie:parent@specificclick.net/ ]
.insightexpressai.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@solvemedia[2].txt [ Cookie:parent@solvemedia.com/ ]
.advertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.advertising.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@lucidmedia[1].txt [ Cookie:parent@lucidmedia.com/ ]
.serving-sys.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.bs.serving-sys.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.monk.sitescoutadserver.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
network.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@yieldmanager[2].txt [ Cookie:parent@yieldmanager.net/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@tribalfusion[2].txt [ Cookie:parent@tribalfusion.com/ ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@statcounter[1].txt [ Cookie:parent@statcounter.com/ ]
.network.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@mediafire[2].txt [ Cookie:parent@mediafire.com/ ]
.network.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@adtechus[1].txt [ Cookie:parent@adtechus.com/ ]
network.realmedia.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@media6degrees[2].txt [ Cookie:parent@media6degrees.com/ ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@adxpose[1].txt [ Cookie:parent@adxpose.com/ ]
.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@unrulymedia[2].txt [ Cookie:parent@unrulymedia.com/blank.gif ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@kontera[1].txt [ Cookie:parent@kontera.com/ ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@apmebf[2].txt [ Cookie:parent@apmebf.com/ ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ads.pointroll.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
G:\USERS\PARENT\AppData\Roaming\Microsoft\Windows\Cookies\Low\parent@2o7[1].txt [ Cookie:parent@2o7.net/ ]
.adlegend.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adlegend.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
i.tracksrv.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tracksrv.com [ G:\USERS\KEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]


#5 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:10:32 PM

Posted 03 July 2013 - 01:53 AM

Hi -
There are several issues showing as Errors that include Adobe Flash Player.
Please uninstall this from Programs and Features first, and Reinstall a Fresh Version
http://get.adobe.com/flashplayer/?promoid=JZEFT <  Flash Player and remove all old versions from Programs and Features.
Untick any Toolbars or Add-Ons offered during the download -

 

 

Java 7 Update 21 (Version: 7.0.210) < Current Java is now Version 7 Update 25 Uninstall all older versions
You can verify the version of Java installed, http://www.java.com/en/download/installed.jsp?detect=jre

Again Untick All Addons and Toolbars offered during the download -

 

 

Windows 7  x64 (UAC is enabled) Out of date service pack!
Do you have Windows Updates enabled, or have these been checked for a while as SP 1 has been offered for a long time now, and it is Very important.

 

 

 

You have old versions of Google Chrome on the system.
Please download and run
OldChromeRemover.
Windows Vista/Windows 7-8 users must use “Run As Administrator.”
Google Chrome 27.0.1453.110 < Out Dated version

 

 

No Antivirus is listed as installed ?? Please install Microsoft Security Essentials

 

 

Thanks -



#6 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 03 July 2013 - 02:55 AM

I removed old flash player and java downloaded the newest ones. When I tried to run OldChromeRemover. it said no chrome detected. I'm using chrome right now so that is strange. I'm not quite sure if I have automatic updates for windows enabled? how do I find that out?



#7 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 03 July 2013 - 04:00 AM

I also updated windows so everything seems to be up to date. I am still having the same issues as before?? still getting pop up videos and ads.



#8 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:10:32 PM

Posted 03 July 2013 - 05:11 AM

Did you install the Antivirus and run a Full Scan with it yet ??



#9 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 03 July 2013 - 06:00 AM

yes I installed mse and I'm doing a full scan now.



#10 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:10:32 PM

Posted 03 July 2013 - 06:17 AM

Hi -
Please run this M/soft FixIt to reset your Hosts File and help protect your computer.
http://go.microsoft.com/?linkid=9668866 < Click Run and just follow the basic instructions

 

Please see Results of screen317's Security Check at Post #3 and follow the link @  Out of Date Service Pack
 

 

Thanks -


Edited by noknojon, 03 July 2013 - 06:23 AM.


#11 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 03 July 2013 - 09:10 PM

still running the antivirus scan...does it usually take this long??



#12 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:10:32 PM

Posted 03 July 2013 - 09:22 PM

Cancel out of the Antivirus scan and only select Quick Scan -

My MSE usually takes 3 to 4 minutes at the most to Quick scan and at the most up to 1 hour to Full scan.

 

We will do an Online Scan with ESET, but this will take about 3 hours on an infected system, so just let this run.

It is best done with Internet Explorer -

 

1.Hold down Control and click HERE to open ESET OnlineScan in a new window.
2.Click the ESET Online Scanner button.

3.NOTE :.For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

 

- 1.Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
- 2.Double click on the ESET Online Scanner icon on your desktop.

 

 4.Check "YES, I accept the Terms of Use."
 5.Click the Start button.
 6.Accept any security warnings from your browser.
 7.Under scan settings, check "Scan Archives" and "Remove found threats"
8.Click Advanced settings and select the following:

Scan potentially unwanted applications
Scan for potentially unsafe applications
Enable Anti-Stealth technology

9.ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this will take some time to download the program for a first time, and then download updated data base (3 hours is not unusual)
10.When the scan completes, click List Threats
11.Click Export, and save the file to your desktop using a unique name, such as ESETScan.
- Include the contents of this report in your next reply.
12.Click the Back button.
13.Click the Finish button[/list]

 

 

Thanks -



#13 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 05 July 2013 - 03:17 AM

ok this is the results of the esetscan:


C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn1.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn11.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn13.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn15.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn17.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn19.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn3.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn5.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn7.zip Win32/Bagle.gen.zip worm
C:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn9.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn1.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn11.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn13.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn15.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn17.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn19.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn3.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn5.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn7.zip Win32/Bagle.gen.zip worm
F:\Users\All Users\Spybot - Search & Destroy\Recovery\Virtumondesdn9.zip Win32/Bagle.gen.zip worm
G:\Users\All Users\eSafe\eSafeSvc.exe a variant of Win32/ELEX.M application
G:\Users\Parent\AppData\Local\Temp\BBF9037F-BAB0-7891-9A58-19549808A584\Latest\IEHelper.dll a variant of Win32/Toolbar.Babylon.E application
G:\Users\Parent\AppData\Local\Temp\BBF9037F-BAB0-7891-9A58-19549808A584\Latest\MyBabylonTB.exe a variant of Win32/Toolbar.Babylon application
G:\Users\Parent\AppData\Local\Temp\BBF9037F-BAB0-7891-9A58-19549808A584\Latest\Setup.exe a variant of Win32/Toolbar.Babylon.E application
G:\Users\Parent\AppData\Local\Temp\DIQ\FlashPlayer_151\OfferBrokerage_14003.exe a variant of Win32/InstallIQ.A application
G:\Users\Parent\AppData\Local\Temp\DIQ\FlashPlayer_151\setup__120.exe a variant of Win32/Amonetize.D application
G:\Users\Parent\AppData\Local\Temp\DIQ\FlashPlayer_151\software\FlashPlayer.exe Win32/DomaIQ.M application
G:\Users\Parent\AppData\Local\Temp\DIQ\FlashPlayer_151\software\OptimizerPro.exe a variant of Win32/SpeedingUpMyPC.B application
G:\Users\Parent\AppData\Local\Temp\DIQ\FlashPlayer_151\software\SweetIPacks.exe probably a variant of Win32/SweetIM.C application
G:\Users\Parent\Downloads\SoftonicDownloader_for_animated-snow-desktop-wallpaper.exe a variant of Win32/SoftonicDownloader.E application
G:\Windows\Temp\AU\AutoUpdate.zip multiple threats
G:\Windows.old\Program Files\Application Updater\ApplicationUpdater.exe probably a variant of Win32/Toolbar.Widgi application
G:\Windows.old\Program Files\Search Settings\SearchSettings.dll Win32/Toolbar.Widgi application
G:\Windows.old\Program Files\Search Settings\SearchSettings.exe Win32/Toolbar.Widgi application
G:\Windows.old\Program Files\Search Settings\SearchSettingsRes409.dll Win32/Toolbar.Widgi application
C:\aahk\tools\bin\fre3vo Android/Exploit.Lotoor.DN trojan cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn1.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn11.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn13.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn15.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn17.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn19.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn3.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn5.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn7.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\ProgramData\Spybot - Search & Destroy\Recovery\Virtumondesdn9.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\Users\Ken\AppData\Local\Temp\CDBurnerXP-updates\cdbxp_setup_4.4.0.2838.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Users\Ken\AppData\Local\Temp\CDBurnerXP-updates\cdbxp_setup_4.4.0.2971.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Users\Ken\AppData\Local\Temp\CDBurnerXP-updates\cdbxp_setup_4.4.1.3099.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Users\Ken\AppData\Local\Temp\CDBurnerXP-updates\cdbxp_setup_4.4.1.3184.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Users\Ken\AppData\Local\Temp\CDBurnerXP-updates\cdbxp_setup_4.4.1.3341.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Users\Ken\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\fbe2001-3a866720 Java/Exploit.CVE-2011-3544.AU trojan cleaned by deleting - quarantined
C:\Users\Ken\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\50ca2a3c-15385899 a variant of Java/Agent.DU trojan cleaned by deleting - quarantined
C:\Users\Ken\Desktop\Android Root Kit\tools\bin\fre3vo Android/Exploit.Lotoor.DN trojan cleaned by deleting - quarantined
C:\Users\Ken\Desktop\folders\hcc\Adobe CS4 Activation Patch\Activation Blocker.cmd BAT/HostsChanger.A application cleaned by deleting - quarantined
C:\Users\Ken\Desktop\folders\video editing stuff\Install files\SoftonicDownloader_for_stanza-desktop.exe a variant of Win32/SoftonicDownloader.A application cleaned by deleting - quarantined
C:\Windows\Temp\Optimizer_Pro.exe multiple threats cleaned by deleting - quarantined
F:\ProgramData\Codecv\uninstall.exe Win32/Adware.MultiPlug.A application cleaned by deleting - quarantined
F:\Users\deeken96\Desktop\compstuff\Codec-V.exe Win32/InstallMate.A application cleaned by deleting - quarantined
F:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\17WI9FON\ApnIC[1].0 a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting - quarantined
F:\Windows\Temp\AskSLib.dll a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting - quarantined
F:\Windows\Temp\RegistryOptimizer.exe multiple threats cleaned by deleting - quarantined
G:\$Recycle.Bin\S-1-5-21-1692986406-1876468813-1101841012-1000\$RUEOVIF.exe a variant of Win32/YourFileDownloader.A application cleaned by deleting - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\coolTexter_Ver1.9.apk Android/DroidRooter.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\flashrec.apk multiple threats deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\InstantRoot (1.04).apk multiple threats deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\Locate Me PRO (1.4).apk Android/Lypro.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\Recovery Flasher (1.1.3).apk multiple threats deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\RemoteSMS (6.3).apk a variant of Android/Remosm.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\Sheriff Android (3.0).apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_v1.31.apk Android/SheriDroid.C application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_ver2.01.apk Android/SheriDroid.B application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_ver2.1.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_ver2.11.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_Ver2.2.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_Ver2.26.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_Ver2.27.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_Ver2.28s.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_Ver2.3.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\sheriffandroid_Ver2.32.apk Android/SheriDroid.A application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\SMB Bomber (1.6).apk Android/TrojanSMS.Bosm.C trojan deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\SMS Commander (1.22).apk a variant of Android/SMSC.B application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\SMS Commander Example.apk Android/SMSC.B application deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\SMS Replier (1.5a).apk Android/Iconosys.C trojan deleted - quarantined
G:\android\Ultimate Collection of Paid Android Apps and Games{2010-2011}\Apps-pack1\Spy Phone (1.0.17).apk Android/SpyPhone.B application deleted - quarantined
G:\Android Games Pack 7\Illusia.rar a variant of Android/Adware.AdsWo.B application deleted - quarantined
G:\ddp\Android Apps and Games Pack (Feb 06 2011)\Android Apps and Games Pack (Feb 06 2011)\a Penetrate Pro v2.10.apk Android/Penetho.A application deleted - quarantined
G:\ddp\Android Apps and Games Pack (Feb 06 2011)\Android Apps and Games Pack (Feb 06 2011)\a Walk and Text v1.3.7.apk Android/Walksteal.A trojan deleted - quarantined
G:\Fishing\TeamHS\HS-AD10.exe a variant of Win32/HackTool.Patcher.A application cleaned by deleting - quarantined
G:\Program Files\DomaIQ Uninstaller\DomaIQUninstall.exe probably a variant of MSIL/DomaIQ.A application cleaned by deleting - quarantined
G:\Program Files\Uninstaller\Uninstall.exe MSIL/DomaIQ.A application cleaned by deleting - quarantined
G:\Program Files (x86)\DefaultTab\DefaultTabSearch.exe a variant of Win32/Toolbar.DefaultTab.B application cleaned by deleting - quarantined
G:\Program Files (x86)\Mozilla Firefox\extensions\{650EED71-89E2-453B-8DCF-2AA1B4AE6EF3}\chrome\dnsbasic.jar Win32/Adware.OneStep application deleted - quarantined
G:\Program Files (x86)\VideoSaver\chrome.crx Win32/Adware.AddLyrics.F application deleted - quarantined
G:\Program Files (x86)\VideoSaver\vdsvrur.exe Win32/Adware.AddLyrics.F application cleaned by deleting - quarantined
G:\Program Files (x86)\VideoSaver\VideoSaver.dll Win32/Adware.AddLyrics.F application cleaned by deleting - quarantined
G:\Program Files (x86)\VideoSaver\FF\chrome\content\main.js Win32/Adware.AddLyrics.F application cleaned by deleting - quarantined
G:\Program Files (x86)\WebCake\WebCakeIEClient.dll probably a variant of Win32/Adware.Yontoo.A application cleaned by deleting - quarantined
G:\ProgramData\eSafe\eSafeSvc.exe a variant of Win32/ELEX.M application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\bin\ChromeModule.dll a variant of Win32/Conduit.SearchProtect.C application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\bin\cltmng.exe a variant of Win32/Conduit.SearchProtect.B application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\bin\FirefoxModule.dll a variant of Win32/Conduit.SearchProtect.C application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\bin\InternetExplorerModule.dll a variant of Win32/Conduit.SearchProtect.C application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\bin\SPHook32.dll probably a variant of Win32/Conduit.SearchProtect.C application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\bin\uninstall.exe Win32/Conduit.SearchProtect.A application cleaned by deleting - quarantined
G:\Users\Extra\AppData\Roaming\SearchProtect\ffprotect\application.js Win32/Conduit.SearchProtect.A application cleaned by deleting - quarantined
G:\Users\ken\AppData\Local\Google\Chrome\User Data\Default\Extensions\ifjgookacnmjghjfagggbkpebmndnbib\1.111_0\contentscript.js Win32/Adware.AddLyrics.F application cleaned by deleting - quarantined
G:\Users\ken\AppData\Local\Temp\ICReinstall_setup (1).exe a variant of Win32/InstallCore.BY application cleaned by deleting - quarantined
G:\Users\ken\Desktop\comp stuff\cbsidlm-tr1_13-FileMenu_Tools-ORG-10810545.exe Win32/DownloadAdmin.G application cleaned by deleting - quarantined
G:\Users\ken\Desktop\comp stuff\setup (1).exe a variant of Win32/InstallCore.BY application cleaned by deleting - quarantined
G:\Users\ken\Downloads\FileMenuTools-setup.exe Win32/InstallMonetizer.AF application cleaned by deleting - quarantined
G:\Users\ken\Downloads\setup.exe Win32/InstallCore.BL application cleaned by deleting - quarantined
G:\Users\Parent\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\65N5ZOCQ\pack[1].7z multiple threats deleted - quarantined
G:\Users\Parent\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7O1R3RY5\pack[1].7z multiple threats deleted - quarantined
G:\Users\Parent\AppData\Local\Temp\hsbing_717_active.exe multiple threats cleaned by deleting - quarantined
G:\Users\Parent\AppData\Local\Temp\Shortcut_SweetIPacks.exe probably a variant of Win32/SweetIM.C application cleaned by deleting - quarantined
G:\Users\Parent\AppData\Local\Temp\toolbar932918208.exe a variant of Win32/Toolbar.Babylon.A application cleaned by deleting - quarantined
G:\Users\Parent\AppData\Local\Temp\BBF9037F-BAB0-7891-9A58-19549808A584\Setup.exe a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
G:\Users\Parent\AppData\Local\Temp\BBF9037F-BAB0-7891-9A58-19549808A584\Latest\IECookieLow.dll a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined

#14 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:10:32 PM

Posted 05 July 2013 - 04:06 AM

OK -

That pulled out quite a few minor and a few major infections in one hit.

Have you managed to run MSE yet ? If so was there any results ?

 

:step1: Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them.
NOTE : You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.
rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.

If normal mode still doesn't work, run the tool from safe mode.
When the scan is done Notepad will open with rKill log.
Post it in your next reply.
NOTE. rKill.txt log will also be present on your desktop.
 

 

 

:step2: Please download AdwCleaner by Xplode onto your desktop.

*Close all open programs and internet browsers.
*Double click on adwcleaner.exe to run the tool.
*Click on Delete.
*Confirm each time with Ok.
* NOTE : Your computer will be rebooted automatically and a text file will open after the restart.

*Please post the contents of that logfile with your next reply.
*You can find the logfile at C:\AdwCleaner[S1].txt as well.

 

 

:step3: Please download Junkware Removal Tool by thisisu to your desktop
Shut down your protection software now to avoid potential conflicts.
Run the tool by double-clicking it.

If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
Post the contents of JRT.txt into your next message.

 

 

:step4: Please download Temp File Cleaner or TFC by Old Timer
Usage Instructions:

  • Download TFC from the download link above and save the file on your desktop.
  • Close ALL running applications as TFC will terminate them before attempting to clean up the temporary files.
  • Double-click on the TFC icon.
  • When the program opens, click on the Start button.  TFC will terminate the Explorer process and all running applications and then begin the process of cleaning out all of your temp folders.
  • When done, press OK and Reboot your computer and finish the cleanup.

Note: Depending on how much data is currently stored in the Temp folders, this process can take quite a while to remove all of the files, so please be patient.

 

 

Thanks -



#15 deedee0496

deedee0496
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:32 AM

Posted 06 July 2013 - 04:17 AM

Rkill 2.5.3 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Invalid arguments ignored: InternetFiles\Content.IE5\35U7UWWK\iExplore[1].exe

Program started at: 07/06/2013 04:20:59 AM in x64 mode.
Windows Version: Windows 7 Ultimate

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * G:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe (PID: 1504) [WD-HEUR]

1 proccess terminated!

Checking Registry for malware related settings:

 * Explorer Policy Removed:  NoActiveDesktopChanges [HKLM]

Backup Registry file created at:
 G:\Users\ken\Desktop\rkill\rkill-07-06-2013-04-21-42.reg

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * No issues found.

Program finished at: 07/06/2013 04:24:20 AM
Execution time: 0 hours(s), 3 minute(s), and 21 seconds(s)

 

 

# AdwCleaner v2.304 - Logfile created 07/06/2013 at 04:32:30
# Updated 03/07/2013 by Xplode
# Operating system : Windows 7 Ultimate  (64 bits)
# User : ken - PARENT-PC
# Boot Mode : Normal
# Running from : G:\Users\ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1XJXATGB\2-adwcleaner[1].exe
# Option [Delete]

***** [Services] *****

***** [Files / Folders] *****

Deleted on reboot : G:\Users\ken\AppData\Local\Google\Chrome\User Data\Default\Extensions\cbjibcbpmbcabnfnohhgjjmkgkimajko
Folder Deleted : G:\Program Files (x86)\Common Files\Wondershare
Folder Deleted : G:\Program Files (x86)\Conduit
Folder Deleted : G:\Program Files (x86)\DefaultTab
Folder Deleted : G:\Program Files (x86)\Desk 365
Folder Deleted : G:\Program Files (x86)\DnsBasic
Folder Deleted : G:\Program Files (x86)\SweetIM
Folder Deleted : G:\Program Files (x86)\VideoSaver
Folder Deleted : G:\Program Files (x86)\WebCake
Folder Deleted : G:\Program Files (x86)\Wondershare
Folder Deleted : G:\Program Files\DomaIQ Uninstaller
Folder Deleted : G:\ProgramData\Ask
Folder Deleted : G:\ProgramData\Babylon
Folder Deleted : G:\ProgramData\Browser Manager
Folder Deleted : G:\ProgramData\DnsBasic
Folder Deleted : G:\ProgramData\eSafe
Folder Deleted : G:\ProgramData\Tarma Installer
Folder Deleted : G:\Users\Extra\AppData\Roaming\SearchProtect
Folder Deleted : G:\Users\ken\AppData\Local\Google\Chrome\User Data\Default\Extensions\cbjibcbpmbcabnfnohhgjjmkgkimajko
Folder Deleted : G:\Users\Parent\AppData\Local\Supreme Savings
Folder Deleted : G:\Users\Parent\AppData\Local\Wondershare
Folder Deleted : G:\Users\Parent\AppData\LocalLow\BabylonToolbar
Folder Deleted : G:\Users\Parent\AppData\Roaming\Babylon
Folder Deleted : G:\Users\Parent\AppData\Roaming\yourfiledownloader
Folder Deleted : G:\Windows\Installer\{EBE677C0-CBCB-4EBF-8098-E27E1B5271CF}

***** [Registry] *****

Key Deleted : HKCU\Software\Google\Chrome\Extensions\cbjibcbpmbcabnfnohhgjjmkgkimajko
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\cbjibcbpmbcabnfnohhgjjmkgkimajko

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.7600.17267

[OK] Registry is clean.

-\\ Google Chrome v27.0.1453.116

File : G:\Users\Parent\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

File : G:\Users\ken\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted [l.2509] : homepage = "hxxp://search.babylon.com/?affID=116775&tt=4912_7&babsrc=HP_ss&mntrId=18abf656000000[...]

*************************

AdwCleaner[R1].txt - [24322 octets] - [02/07/2013 07:25:32]
AdwCleaner[R2].txt - [2571 octets] - [02/07/2013 07:39:37]
AdwCleaner[R3].txt - [2571 octets] - [02/07/2013 08:07:55]
AdwCleaner[S1].txt - [25130 octets] - [02/07/2013 07:28:37]
AdwCleaner[S2].txt - [2738 octets] - [02/07/2013 07:40:38]
AdwCleaner[S3].txt - [2733 octets] - [02/07/2013 08:08:49]
AdwCleaner[S4].txt - [2949 octets] - [06/07/2013 04:32:30]

########## EOF - G:\AdwCleaner[S4].txt - [3009 octets] ##########






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users