Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

random audio from speakers was told it was a Zekos infection


  • This topic is locked This topic is locked
10 replies to this topic

#1 xanthin1

xanthin1

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:37 AM

Posted 27 June 2014 - 12:39 PM

I have windows 7, and my computer is fairly new (9 months) I have never had a problem with it before, then last week, Avast (free) all of a sudden started popping up with warnings about every 5-20 seconds that it blocked something malicious.  I ran Avast antivirus, malwarebyte, and Kaspersky, tried to run hijackthis (but couldn't save a logfile so gave up) but found nothing.  I installed updates, on everything, still couldn't find the problem.  The next morning I began getting random sound from my speakers, sometimes music, sometimes what sounded like cooking show segments, and someone comparing the fashion on madmen.  sometimes more than one program would be talking at the same time.  Always sounded static-y like it was getting a bad connection.  Only stopped when I turned off my wireless modem.  A friend who does tech stuff for a living and knows more than I do (I thought) took it over the weekend and ran some anti spyware stuff, said he couldn't really find much wrong.  I got it back today, and the random speaker issue is still driving me nuts.  I took avast off and put Microsoft security essentials, so no more avast pop-ups but what is going on?

 

I have tried running rkill, then tdsskiller, then malwarebytes in that order both in normal and safe modes, but nothing comes up wrong.  I was told in another post on this forum that I have a Zekos infection?  Unsure what to do next.  Below are the results from the dds.txt log

 

DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 11.0.9600.17126
Run by xanthin1 at 10:29:50 on 2014-06-27
Microsoft Windows 7 Professional   6.1.7601.1.1252.1.1033.18.3968.1681 [GMT -7:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Microsoft Security Essentials *Enabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
.
============== Running Processes ===============
.
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
c:\Program Files\Microsoft Security Client\MsMpEng.exe
svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\igfxCUIService.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
c:\Program Files\Intel\iCLS Client\HeciServer.exe
C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe
C:\Program Files (x86)\LogMeIn\x64\RaMaint.exe
C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe
C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Program Files (x86)\Dell Wireless\Ath_WlanAgent.exe
C:\Program Files (x86)\LogMeIn\x64\LogMeIn.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\wbem\wmiprvse.exe
c:\Program Files\Microsoft Security Client\NisSrv.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\System32\WUDFHost.exe
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\Dwm.exe
C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskhost.exe
C:\Windows\system32\igfxEM.exe
C:\Windows\system32\igfxHK.exe
C:\Windows\system32\igfxTray.exe
C:\Program Files (x86)\LogMeIn\x64\LogMeInSystray.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files (x86)\Dell DataSafe Local Backup\TOASTER.EXE
C:\Program Files (x86)\Dell DataSafe Local Backup\COMPONENTS\SCHEDULER\STSERVICE.EXE
C:\Program Files (x86)\Dell DataSafe Local Backup\Components\DSUpdate\DSUpd.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
C:\Program Files (x86)\Dell Digital Delivery\DeliveryService.exe
C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe
C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
C:\Windows\system32\sppsvc.exe
C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\taskeng.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.yahoo.com/
uSearch Page = hxxp://www.bing.com/search?q={searchTerms}&FORM=AVASDF&PC=AV01
mWinlogon: Userinit = userinit.exe,
BHO: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
mPolicies-Explorer: NoActiveDesktop = dword:1
mPolicies-Explorer: NoActiveDesktopChanges = dword:1
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{9342FF77-9050-433F-BC29-E481DD12DD11} : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{C5D6504E-232D-4215-850A-F71E74547ED9} : DHCPNameServer = 192.168.1.1
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll
Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
SSODL: WebCheck - <orphaned>
x64-BHO: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
x64-Run: [LogMeIn GUI] "C:\Program Files (x86)\LogMeIn\x64\LogMeInSystray.exe"
x64-Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey
x64-Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - <orphaned>
x64-Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - <orphaned>
x64-Notify: igfxcui - igfxdev.dll
x64-SSODL: WebCheck - <orphaned>
.
============= SERVICES / DRIVERS ===============
.
R0 iusb3hcs;Intel® USB 3.0 Host Controller Switch Driver;C:\Windows\System32\drivers\iusb3hcs.sys [2013-8-26 16152]
R0 MpFilter;Microsoft Malware Protection Driver;C:\Windows\System32\drivers\MpFilter.sys [2014-1-25 268512]
R2 DellDigitalDelivery;Dell Digital Delivery Service;C:\Program Files (x86)\Dell Digital Delivery\DeliveryService.exe [2014-4-10 202248]
R2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe [2013-8-26 13592]
R2 igfxCUIService1.0.0.0;Intel® HD Graphics Control Panel Service;C:\Windows\System32\igfxCUIService.exe [2014-5-21 314696]
R2 Intel® Capability Licensing Service Interface;Intel® Capability Licensing Service Interface;C:\Program Files\Intel\iCLS Client\HeciServer.exe [2011-12-8 607456]
R2 LMIGuardianSvc;LMIGuardianSvc;C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe [2014-6-6 376144]
R2 LMIInfo;LogMeIn Kernel Information Provider;C:\Program Files (x86)\LogMeIn\x64\rainfo.sys [2014-2-7 16056]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;C:\Windows\System32\drivers\LMIRfsDriver.sys [2014-6-23 72216]
R2 MBAMScheduler;MBAMScheduler;C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe [2014-6-26 1809720]
R2 MBAMService;MBAMService;C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe [2014-6-26 860472]
R2 NisDrv;Microsoft Network Inspection System;C:\Windows\System32\drivers\NisDrvWFP.sys [2014-3-11 133928]
R2 SftService;SoftThinks Agent Service;C:\Program Files (x86)\Dell DataSafe Local Backup\SftService.exe [2013-8-26 1695040]
R2 UNS;Intel® Management and Security Application User Notification Service;C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe [2013-8-26 363800]
R2 ZAtheros Wlan Agent;ZAtheros Wlan Agent;C:\Program Files (x86)\Dell Wireless\Ath_WlanAgent.exe [2013-8-26 73728]
R3 IntcDAud;Intel® Display Audio;C:\Windows\System32\drivers\IntcDAud.sys [2013-8-26 331264]
R3 iusb3hub;Intel® USB 3.0 Hub Driver;C:\Windows\System32\drivers\iusb3hub.sys [2013-8-26 356120]
R3 iusb3xhc;Intel® USB 3.0 eXtensible Host Controller Driver;C:\Windows\System32\drivers\iusb3xhc.sys [2013-8-26 788760]
R3 MBAMProtector;MBAMProtector;C:\Windows\System32\drivers\mbam.sys [2014-6-26 25816]
R3 MBAMSwissArmy;MBAMSwissArmy;C:\Windows\System32\drivers\MBAMSwissArmy.sys [2014-6-26 122584]
R3 MBAMWebAccessControl;MBAMWebAccessControl;C:\Windows\System32\drivers\mwac.sys [2014-6-26 63704]
R3 NisSrv;Microsoft Network Inspection;C:\Program Files\Microsoft Security Client\NisSrv.exe [2014-3-11 347872]
R3 RTL8167;Realtek 8167 NT Driver;C:\Windows\System32\drivers\Rt64win7.sys [2013-8-26 565352]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2013-9-11 105144]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2013-9-11 124088]
S2 SkypeUpdate;Skype Updater;C:\Program Files (x86)\Skype\Updater\Updater.exe [2013-10-23 172192]
S3 dmvsc;dmvsc;C:\Windows\System32\drivers\dmvsc.sys [2010-11-21 71168]
S3 fssfltr;fssfltr;C:\Windows\System32\drivers\fssfltr.sys [2013-8-26 57856]
S3 fsssvc;Windows Live Family Safety Service;C:\Program Files (x86)\Windows Live\Family Safety\fsssvc.exe [2012-9-12 1512448]
S3 IEEtwCollectorService;Internet Explorer ETW Collector Service;C:\Windows\System32\ieetwcollector.exe [2014-6-10 111616]
S3 netvsc;netvsc;C:\Windows\System32\drivers\netvsc60.sys [2010-11-21 168448]
S3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;C:\Windows\System32\drivers\rdpvideominiport.sys [2014-6-24 19456]
S3 StorSvc;Storage Service;C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted [2009-7-13 27136]
S3 SynthVid;SynthVid;C:\Windows\System32\drivers\VMBusVideoM.sys [2010-11-21 22528]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\System32\drivers\TsUsbFlt.sys [2014-6-24 56832]
S3 TsUsbGD;Remote Desktop Generic USB Device;C:\Windows\System32\drivers\TsUsbGD.sys [2014-6-24 30208]
S3 WatAdminSvc;Windows Activation Technologies Service;C:\Windows\System32\Wat\WatAdminSvc.exe [2013-9-30 1255736]
.
=============== Created Last 30 ================
.
2014-06-27 01:46:30 -------- d-----w- C:\ProgramData\HitmanPro
2014-06-26 23:24:55 122584 ----a-w- C:\Windows\System32\drivers\MBAMSwissArmy.sys
2014-06-26 23:24:40 91352 ----a-w- C:\Windows\System32\drivers\mbamchameleon.sys
2014-06-26 23:24:40 63704 ----a-w- C:\Windows\System32\drivers\mwac.sys
2014-06-26 23:24:40 25816 ----a-w- C:\Windows\System32\drivers\mbam.sys
2014-06-26 23:24:40 -------- d-----w- C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-06-26 22:39:37 -------- d-----w- C:\Users\xanthin1\AppData\Local\Adobe
2014-06-26 22:05:33 1031560 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{93EA13C5-FAD9-4AAD-8332-981ECA8E915B}\gapaengine.dll
2014-06-26 22:05:30 10779000 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{037588C3-6824-4F70-8021-583D72547602}\mpengine.dll
2014-06-26 22:04:21 -------- d-----w- C:\Program Files (x86)\Microsoft Security Client
2014-06-26 22:04:18 -------- d-----w- C:\Program Files\Microsoft Security Client
2014-06-26 21:47:52 16384 ----a-w- C:\Windows\System32\RdpGroupPolicyExtension.dll
2014-06-26 21:47:51 3178496 ----a-w- C:\Windows\System32\rdpcorets.dll
2014-06-26 21:47:49 6574592 ----a-w- C:\Windows\System32\mstscax.dll
2014-06-26 21:47:49 5694464 ----a-w- C:\Windows\SysWow64\mstscax.dll
2014-06-26 21:42:20 144 ----a-w- C:\Windows\System32\{A6D608F0-0BDE-491A-97AE-5C4B05D86E01}.bat
2014-06-25 01:57:01 -------- d-----w- C:\Program Files (x86)\Dell Digital Delivery
2014-06-25 01:55:04 -------- d-sh--w- C:\Users\xanthin1\IntelGraphicsProfiles
2014-06-25 01:54:55 451 ----a-w- C:\Windows\System32\{F33C3B9B-72AF-418A-B3FD-560646F7CDA2}.bat
2014-06-25 01:47:30 30208 ----a-w- C:\Windows\System32\drivers\TsUsbGD.sys
2014-06-25 01:47:30 19456 ----a-w- C:\Windows\System32\drivers\rdpvideominiport.sys
2014-06-25 01:47:28 243200 ----a-w- C:\Windows\System32\rdpudd.dll
2014-06-25 01:47:28 228864 ----a-w- C:\Windows\System32\rdpendp_winip.dll
2014-06-25 01:47:28 192000 ----a-w- C:\Windows\SysWow64\rdpendp_winip.dll
2014-06-25 01:45:39 792576 ----a-w- C:\Windows\SysWow64\TSWorkspace.dll
2014-06-25 01:45:39 1030144 ----a-w- C:\Windows\System32\TSWorkspace.dll
2014-06-25 01:45:35 514560 ----a-w- C:\Windows\SysWow64\qdvd.dll
2014-06-25 01:45:35 366592 ----a-w- C:\Windows\System32\qdvd.dll
2014-06-24 22:01:24 -------- d-----w- C:\Users\xanthin1\AppData\Roaming\PCDr
2014-06-24 21:06:23 10779000 ----a-w- C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{5A42D75A-924C-4A32-9984-51D3D1340BAE}\mpengine.dll
2014-06-24 02:13:30 -------- d-----w- C:\Program Files (x86)\Microsoft ActiveSync
2014-06-24 02:13:07 -------- d-----w- C:\Windows\PCHEALTH
2014-06-24 00:54:19 423240 ----a-w- C:\Windows\System32\drivers\aswsp.sys.1403571268729
2014-06-24 00:54:19 1039096 ----a-w- C:\Windows\System32\drivers\aswsnx.sys.1403571268729
2014-06-24 00:26:17 -------- d-----w- C:\Users\xanthin1\AppData\Local\LogMeInIgnition
2014-06-24 00:26:11 -------- d-----w- C:\Users\xanthin1\AppData\Local\LogMeIn
2014-06-24 00:26:07 72216 ----a-w- C:\Windows\System32\drivers\LMIRfsDriver.sys
2014-06-24 00:26:07 60744 ----a-w- C:\Windows\System32\Spool\prtprocs\x64\LMIproc.dll
2014-06-24 00:26:07 35656 ----a-w- C:\Windows\System32\LMIport.dll
2014-06-24 00:26:07 107368 ----a-w- C:\Windows\System32\LMIRfsClientNP.dll
2014-06-24 00:26:06 92488 ----a-w- C:\Windows\System32\LMIinit.dll
2014-06-24 00:26:02 -------- d-----w- C:\ProgramData\LogMeIn
2014-06-24 00:25:57 -------- d-----w- C:\Program Files (x86)\LogMeIn
2014-06-23 02:28:19 -------- d-----w- C:\ProgramData\Trend Micro
2014-06-23 02:22:33 -------- d-s---w- C:\Windows\SysWow64\Microsoft
2014-06-19 03:26:08 -------- d-----w- C:\ProgramData\Malwarebytes
2014-06-19 03:25:54 -------- d-----w- C:\Users\xanthin1\AppData\Local\Programs
2014-06-19 03:20:13 -------- d-----w- C:\Windows\System32\appmgmt
2014-06-11 02:44:25 506368 ----a-w- C:\Windows\System32\aepdu.dll
2014-06-11 02:44:20 424448 ----a-w- C:\Windows\System32\aeinv.dll
.
==================== Find3M  ====================
.
2014-06-24 00:51:37 71344 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2014-06-24 00:51:37 699056 ----a-w- C:\Windows\SysWow64\FlashPlayerApp.exe
2014-05-30 10:02:37 2724864 ----a-w- C:\Windows\System32\mshtml.tlb
2014-05-30 10:02:09 4096 ----a-w- C:\Windows\System32\ieetwcollectorres.dll
2014-05-30 09:39:43 548352 ----a-w- C:\Windows\System32\vbscript.dll
2014-05-30 09:39:23 66048 ----a-w- C:\Windows\System32\iesetup.dll
2014-05-30 09:38:29 48640 ----a-w- C:\Windows\System32\ieetwproxystub.dll
2014-05-30 09:21:23 139264 ----a-w- C:\Windows\System32\ieUnatt.exe
2014-05-30 09:21:05 111616 ----a-w- C:\Windows\System32\ieetwcollector.exe
2014-05-30 09:20:36 752640 ----a-w- C:\Windows\System32\jscript9diag.dll
2014-05-30 09:11:24 940032 ----a-w- C:\Windows\System32\MsSpellCheckingFacility.exe
2014-05-30 09:08:22 5782528 ----a-w- C:\Windows\System32\jscript9.dll
2014-05-30 09:02:39 2724864 ----a-w- C:\Windows\SysWow64\mshtml.tlb
2014-05-30 08:55:36 38400 ----a-w- C:\Windows\System32\JavaScriptCollectionAgent.dll
2014-05-30 08:44:28 455168 ----a-w- C:\Windows\SysWow64\vbscript.dll
2014-05-30 08:43:06 61952 ----a-w- C:\Windows\SysWow64\iesetup.dll
2014-05-30 08:42:16 51200 ----a-w- C:\Windows\SysWow64\ieetwproxystub.dll
2014-05-30 08:28:33 112128 ----a-w- C:\Windows\SysWow64\ieUnatt.exe
2014-05-30 08:27:56 592896 ----a-w- C:\Windows\SysWow64\jscript9diag.dll
2014-05-30 08:24:19 1249280 ----a-w- C:\Windows\System32\mshtmlmedia.dll
2014-05-30 08:23:22 2040832 ----a-w- C:\Windows\System32\inetcpl.cpl
2014-05-30 08:10:46 32256 ----a-w- C:\Windows\SysWow64\JavaScriptCollectionAgent.dll
2014-05-30 07:56:56 2266112 ----a-w- C:\Windows\System32\wininet.dll
2014-05-30 07:56:50 4244992 ----a-w- C:\Windows\SysWow64\jscript9.dll
2014-05-30 07:50:09 1068032 ----a-w- C:\Windows\SysWow64\mshtmlmedia.dll
2014-05-30 07:49:38 1964544 ----a-w- C:\Windows\SysWow64\inetcpl.cpl
2014-05-30 07:21:10 1790976 ----a-w- C:\Windows\SysWow64\wininet.dll
2014-04-25 02:34:59 801280 ----a-w- C:\Windows\System32\usp10.dll
2014-04-25 02:06:17 626688 ----a-w- C:\Windows\SysWow64\usp10.dll
2014-04-12 02:22:05 95680 ----a-w- C:\Windows\System32\drivers\ksecdd.sys
2014-04-12 02:22:05 155072 ----a-w- C:\Windows\System32\drivers\ksecpkg.sys
2014-04-12 02:19:38 29184 ----a-w- C:\Windows\System32\sspisrv.dll
2014-04-12 02:19:38 136192 ----a-w- C:\Windows\System32\sspicli.dll
2014-04-12 02:19:37 28160 ----a-w- C:\Windows\System32\secur32.dll
2014-04-12 02:19:32 1460736 ----a-w- C:\Windows\System32\lsasrv.dll
2014-04-12 02:19:05 31232 ----a-w- C:\Windows\System32\lsass.exe
2014-04-12 02:12:06 22016 ----a-w- C:\Windows\SysWow64\secur32.dll
2014-04-12 02:10:56 96768 ----a-w- C:\Windows\SysWow64\sspicli.dll
2014-04-05 02:47:20 1903552 ----a-w- C:\Windows\System32\drivers\tcpip.sys
2014-04-05 02:47:09 288192 ----a-w- C:\Windows\System32\drivers\FWPKCLNT.SYS
.
============= FINISH: 10:30:49.13 ===============
 

 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:10:37 AM

Posted 30 June 2014 - 04:40 AM

Hello! Welcome to BleepingComputer Forums! :welcome:
My name is Georgi and and I will be helping you with your computer problems.

Before we begin, please note the following:

  • I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
  • The logs can take some time to research, so please be patient with me.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
  • Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
  • Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.

 

 

Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

 

  • Next please re-run FRST again and type the following in the edit box after Search: rpcss.dll
  • Click the Search button
  • It will make a log (Search.txt)- please post the log into your reply to me.

 

Regards,

Georgi


cXfZ4wS.png


#3 xanthin1

xanthin1
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:37 AM

Posted 30 June 2014 - 11:28 AM

Georgi,

 

I ended up running the 64 bit version.  Below are the copied and pasted logs you asked for as well as the attached one.  Thank you.

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 28-06-2014 02
Ran by xanthin1 (administrator) on XANTHIN1-PC on 30-06-2014 09:19:52
Running from C:\Users\xanthin1\Desktop
Platform: Windows 7 Professional Service Pack 1 (X64) OS Language: English (United States)
Internet Explorer Version 11
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(Microsoft Corporation) C:\Program Files\Microsoft Security Client\MsMpEng.exe
(Intel Corporation) C:\Windows\System32\igfxCUIService.exe
(Microsoft Corporation) C:\Windows\System32\wlanext.exe
(Intel® Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe
(LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe
(LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn\x64\ramaint.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe
(LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn\x64\LogMeInSystray.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
(SoftThinks SAS) C:\Program Files (x86)\Dell DataSafe Local Backup\SftService.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Atheros) C:\Program Files (x86)\Dell Wireless\Ath_WlanAgent.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn\x64\LogMeIn.exe
(SoftThinks - Dell) C:\Program Files (x86)\Dell DataSafe Local Backup\Toaster.exe
() C:\Program Files (x86)\Dell DataSafe Local Backup\Components\Scheduler\STService.exe
(SoftThinks - Dell) C:\Program Files (x86)\Dell DataSafe Local Backup\Components\DSUpdate\DSUpd.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\NisSrv.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe
(Intel Corporation) C:\Windows\System32\igfxEM.exe
(Intel Corporation) C:\Windows\System32\igfxHK.exe
(Intel Corporation) C:\Windows\System32\igfxTray.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Dell Products, LP.) C:\Program Files (x86)\Dell Digital Delivery\DeliveryService.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [LogMeIn GUI] => C:\Program Files (x86)\LogMeIn\x64\LogMeInSystray.exe [57928 2014-02-07] (LogMeIn, Inc.)
HKLM\...\Run: [MSC] => c:\Program Files\Microsoft Security Client\msseces.exe [1271072 2014-03-11] (Microsoft Corporation)
Winlogon\Notify\igfxcui: igfxdev.dll [X]
ShellIconOverlayIdentifiers: 00avast -> {472083B0-C522-11CF-8763-00608CC02F24} =>  No File

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.bing.com/search?q={searchTerms}&FORM=AVASDF&PC=AV01
HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.msn.com/?pc=AV01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0xF0D65442008CCF01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-US
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/?pc=AV01
SearchScopes: HKLM - DefaultScope {7BC4E250-20BC-48A9-A9F0-E3B34F373F24} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKLM - {7BC4E250-20BC-48A9-A9F0-E3B34F373F24} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKLM-x32 - DefaultScope {632F07F3-19A1-4d16-A23F-E6CE9486BAB5} URL = http://www.bing.com/search?q={searchTerms}&FORM=AVASDF&PC=AV01
SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKLM-x32 - {632F07F3-19A1-4d16-A23F-E6CE9486BAB5} URL = http://www.bing.com/search?q={searchTerms}&FORM=AVASDF&PC=AV01
SearchScopes: HKLM-x32 - {7BC4E250-20BC-48A9-A9F0-E3B34F373F24} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKCU - DefaultScope {632F07F3-19A1-4d16-A23F-E6CE9486BAB5} URL = http://www.bing.com/search?q={searchTerms}&FORM=AVASDF&PC=AV01
SearchScopes: HKCU - {632F07F3-19A1-4d16-A23F-E6CE9486BAB5} URL = http://www.bing.com/search?q={searchTerms}&FORM=AVASDF&PC=AV01
SearchScopes: HKCU - {7BC4E250-20BC-48A9-A9F0-E3B34F373F24} URL =
BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO-x32: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
Toolbar: HKLM - No Name - {318A227B-5E9F-45bd-8999-7F8F10CA4CF5} -  No File
DPF: HKLM-x32 {166B1BCA-3F9C-11CF-8075-444553540000} http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
Handler-x32: http\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: http\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: https\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: https\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: msdaipp\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: msdaipp\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll (Skype Technologies)
Filter: text/xml - {807553E5-5146-11D5-A672-00B0D022E945} -  No File
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1

FireFox:
========
FF Plugin: @microsoft.com/GENUINE - disabled No File
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/ShockwavePlayer - C:\Windows\SysWOW64\Adobe\Director\np32dsw_1210150.dll (Adobe Systems, Inc.)
FF Plugin-x32: @microsoft.com/GENUINE - disabled No File
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files (x86)\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=16.4.3505.0912 - C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)

==================== Services (Whitelisted) =================

R2 DcomLaunch; C:\Windows\system32\rpcss.dll [524288 2010-11-20] (Microsoft Corporation) [File not signed]
R2 igfxCUIService1.0.0.0; C:\Windows\system32\igfxCUIService.exe [314696 2014-05-21] (Intel Corporation)
R2 LMIGuardianSvc; C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe [376144 2014-06-06] (LogMeIn, Inc.)
R2 LMIMaint; C:\Program Files (x86)\LogMeIn\x64\RaMaint.exe [226640 2014-06-06] (LogMeIn, Inc.)
R2 LogMeIn; C:\Program Files (x86)\LogMeIn\x64\LogMeIn.exe [407424 2014-02-07] (LogMeIn, Inc.)
R2 MBAMScheduler; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe [1809720 2014-05-12] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe [860472 2014-05-12] (Malwarebytes Corporation)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [23808 2014-03-11] (Microsoft Corporation)
R3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [347872 2014-03-11] (Microsoft Corporation)
R2 RpcSs; C:\Windows\system32\rpcss.dll [524288 2010-11-20] (Microsoft Corporation) [File not signed]
R2 ZAtheros Wlan Agent; C:\Program Files (x86)\Dell Wireless\Ath_WlanAgent.exe [73728 2012-02-07] (Atheros) [File not signed]

==================== Drivers (Whitelisted) ====================

R2 LMIInfo; C:\Program Files (x86)\LogMeIn\x64\RaInfo.sys [16056 2014-02-07] (LogMeIn, Inc.)
S4 LMIRfsClientNP; No ImagePath
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [25816 2014-05-12] (Malwarebytes Corporation)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [122584 2014-06-30] (Malwarebytes Corporation)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [63704 2014-05-12] (Malwarebytes Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [268512 2014-01-25] (Microsoft Corporation)
R2 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [133928 2014-03-11] (Microsoft Corporation)
S3 MFE_RR; \??\C:\Users\xanthin1\AppData\Local\Temp\mfe_rr.sys [X]

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2014-06-30 09:19 - 2014-06-30 09:20 - 00010311 _____ () C:\Users\xanthin1\Desktop\FRST.txt
2014-06-30 09:19 - 2014-06-30 09:19 - 00000000 ____D () C:\FRST
2014-06-30 09:18 - 2014-06-30 09:18 - 02083328 _____ (Farbar) C:\Users\xanthin1\Desktop\FRST64.exe
2014-06-27 10:30 - 2014-06-27 10:33 - 00017122 _____ () C:\Users\xanthin1\Desktop\dds.txt
2014-06-27 10:30 - 2014-06-27 10:33 - 00010723 _____ () C:\Users\xanthin1\Desktop\attach.txt
2014-06-27 10:28 - 2014-06-27 10:28 - 00688992 ____R (Swearware) C:\Users\xanthin1\Desktop\dds.com
2014-06-26 18:54 - 2014-06-26 18:54 - 01402880 _____ () C:\Users\xanthin1\Downloads\HijackThis.msi
2014-06-26 18:46 - 2014-06-26 18:50 - 00000000 ____D () C:\ProgramData\HitmanPro
2014-06-26 16:51 - 2014-06-26 16:51 - 04181856 _____ (Kaspersky Lab ZAO) C:\Users\xanthin1\Desktop\tdsskiller.exe
2014-06-26 16:50 - 2014-06-26 16:50 - 01942776 _____ (Bleeping Computer, LLC) C:\Users\xanthin1\Desktop\rkill.exe
2014-06-26 16:24 - 2014-06-30 09:19 - 00122584 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-06-26 16:24 - 2014-06-26 16:24 - 00001108 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-06-26 16:24 - 2014-06-26 16:24 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-06-26 16:24 - 2014-06-26 16:24 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-06-26 16:24 - 2014-05-12 07:26 - 00091352 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-06-26 16:24 - 2014-05-12 07:26 - 00063704 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-06-26 16:24 - 2014-05-12 07:25 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-06-26 16:21 - 2014-06-26 17:04 - 00005084 _____ () C:\Users\xanthin1\Desktop\Rkill.txt
2014-06-26 15:39 - 2014-06-26 15:39 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\Adobe
2014-06-26 15:04 - 2014-06-26 15:04 - 00002119 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Security Essentials.lnk
2014-06-26 15:04 - 2014-06-26 15:04 - 00001945 _____ () C:\Windows\epplauncher.mif
2014-06-26 15:04 - 2014-06-26 15:04 - 00000000 ____D () C:\Program Files\Microsoft Security Client
2014-06-26 15:04 - 2014-06-26 15:04 - 00000000 ____D () C:\Program Files (x86)\Microsoft Security Client
2014-06-26 14:47 - 2014-05-08 02:32 - 03178496 _____ (Microsoft Corporation) C:\Windows\system32\rdpcorets.dll
2014-06-26 14:47 - 2014-05-08 02:32 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\RdpGroupPolicyExtension.dll
2014-06-26 14:47 - 2014-01-08 19:22 - 05694464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mstscax.dll
2014-06-26 14:47 - 2014-01-03 15:44 - 06574592 _____ (Microsoft Corporation) C:\Windows\system32\mstscax.dll
2014-06-26 14:42 - 2014-06-26 14:42 - 00000144 _____ () C:\Windows\system32\{A6D608F0-0BDE-491A-97AE-5C4B05D86E01}.bat
2014-06-24 18:57 - 2014-06-24 18:57 - 00000000 ____D () C:\Program Files (x86)\Dell Digital Delivery
2014-06-24 18:54 - 2014-06-24 18:54 - 00000451 _____ () C:\Windows\system32\{F33C3B9B-72AF-418A-B3FD-560646F7CDA2}.bat
2014-06-24 18:53 - 2014-06-26 15:00 - 00336720 _____ () C:\Windows\PFRO.log
2014-06-24 18:50 - 2014-06-26 19:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Silverlight
2014-06-24 18:50 - 2013-10-01 19:22 - 00056832 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\TsUsbFlt.sys
2014-06-24 18:50 - 2013-10-01 19:11 - 00013824 _____ (Microsoft Corporation) C:\Windows\system32\TsUsbRedirectionGroupPolicyControl.exe
2014-06-24 18:50 - 2013-10-01 19:08 - 00012800 _____ (Microsoft Corporation) C:\Windows\system32\TsUsbRedirectionGroupPolicyExtension.dll
2014-06-24 18:50 - 2013-10-01 18:48 - 00056832 _____ (Microsoft Corporation) C:\Windows\system32\MsRdpWebAccess.dll
2014-06-24 18:50 - 2013-10-01 18:48 - 00018944 _____ (Microsoft Corporation) C:\Windows\system32\wksprtPS.dll
2014-06-24 18:50 - 2013-10-01 18:29 - 00062976 _____ (Microsoft Corporation) C:\Windows\system32\tsgqec.dll
2014-06-24 18:50 - 2013-10-01 18:10 - 00044544 _____ (Microsoft Corporation) C:\Windows\system32\TsUsbGDCoInstaller.dll
2014-06-24 18:50 - 2013-10-01 17:15 - 01057280 _____ (Microsoft Corporation) C:\Windows\system32\rdvidcrl.dll
2014-06-24 18:50 - 2013-10-01 17:14 - 00050176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MsRdpWebAccess.dll
2014-06-24 18:50 - 2013-10-01 17:14 - 00017920 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wksprtPS.dll
2014-06-24 18:50 - 2013-10-01 17:08 - 00083968 _____ (Microsoft Corporation) C:\Windows\system32\TSWbPrxy.exe
2014-06-24 18:50 - 2013-10-01 17:01 - 00420864 _____ (Microsoft Corporation) C:\Windows\system32\wksprt.exe
2014-06-24 18:50 - 2013-10-01 16:58 - 00053248 _____ (Microsoft Corporation) C:\Windows\SysWOW64\tsgqec.dll
2014-06-24 18:50 - 2013-10-01 16:31 - 01147392 _____ (Microsoft Corporation) C:\Windows\system32\mstsc.exe
2014-06-24 18:50 - 2013-10-01 16:08 - 00855552 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rdvidcrl.dll
2014-06-24 18:50 - 2013-10-01 15:34 - 01068544 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mstsc.exe
2014-06-24 18:49 - 2014-06-27 10:24 - 00000000 ____D () C:\Program Files\Microsoft Silverlight
2014-06-24 18:49 - 2014-06-27 10:24 - 00000000 ____D () C:\Program Files (x86)\Microsoft Silverlight
2014-06-24 18:47 - 2012-08-23 07:13 - 00243200 _____ (Microsoft Corporation) C:\Windows\system32\rdpudd.dll
2014-06-24 18:47 - 2012-08-23 07:10 - 00019456 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\rdpvideominiport.sys
2014-06-24 18:47 - 2012-08-23 07:08 - 00030208 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\TsUsbGD.sys
2014-06-24 18:47 - 2012-08-23 04:12 - 00192000 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rdpendp_winip.dll
2014-06-24 18:47 - 2012-08-23 03:51 - 00228864 _____ (Microsoft Corporation) C:\Windows\system32\rdpendp_winip.dll
2014-06-24 18:45 - 2013-09-24 19:23 - 01030144 _____ (Microsoft Corporation) C:\Windows\system32\TSWorkspace.dll
2014-06-24 18:45 - 2013-09-24 18:57 - 00792576 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TSWorkspace.dll
2014-06-24 18:45 - 2012-05-04 04:00 - 00366592 _____ (Microsoft Corporation) C:\Windows\system32\qdvd.dll
2014-06-24 18:45 - 2012-05-04 02:59 - 00514560 _____ (Microsoft Corporation) C:\Windows\SysWOW64\qdvd.dll
2014-06-24 15:01 - 2014-06-30 09:15 - 00000684 _____ () C:\Windows\setupact.log
2014-06-24 15:01 - 2014-06-24 15:01 - 00000000 ____D () C:\Users\xanthin1\AppData\Roaming\PCDr
2014-06-24 15:01 - 2014-06-24 15:01 - 00000000 _____ () C:\Windows\setuperr.log
2014-06-23 19:13 - 2014-06-24 18:47 - 00000000 ____D () C:\Program Files (x86)\Microsoft Office
2014-06-23 19:13 - 2014-06-23 19:13 - 00000000 ____D () C:\Windows\PCHEALTH
2014-06-23 19:13 - 2014-06-23 19:13 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office
2014-06-23 19:13 - 2014-06-23 19:13 - 00000000 ____D () C:\Program Files (x86)\Microsoft ActiveSync
2014-06-23 17:54 - 2014-06-23 17:54 - 01039096 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsnx.sys.1403571268729
2014-06-23 17:54 - 2014-06-23 17:54 - 00423240 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsp.sys.1403571268729
2014-06-23 17:51 - 2014-06-27 10:29 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-06-23 17:51 - 2014-06-23 17:51 - 00003768 _____ () C:\Windows\System32\Tasks\Adobe Flash Player Updater
2014-06-23 17:29 - 2014-06-23 17:29 - 00000020 ___SH () C:\Users\LogMeInRemoteUser\ntuser.ini
2014-06-23 17:29 - 2014-06-22 19:33 - 00000000 ____D () C:\Users\LogMeInRemoteUser\AppData\Local\SoftThinks
2014-06-23 17:29 - 2009-07-13 21:54 - 00000000 ___RD () C:\Users\LogMeInRemoteUser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories
2014-06-23 17:29 - 2009-07-13 21:49 - 00000000 ___RD () C:\Users\LogMeInRemoteUser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance
2014-06-23 17:26 - 2014-06-30 09:15 - 00001006 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LogMeIn Client.lnk
2014-06-23 17:26 - 2014-06-30 09:15 - 00000990 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LogMeIn Control Panel.lnk
2014-06-23 17:26 - 2014-06-30 09:15 - 00000000 ____D () C:\ProgramData\LogMeIn
2014-06-23 17:26 - 2014-06-23 17:26 - 00001024 _____ () C:\.rnd
2014-06-23 17:26 - 2014-06-23 17:26 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\LogMeInIgnition
2014-06-23 17:26 - 2014-06-23 17:26 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\LogMeIn
2014-06-23 17:26 - 2014-06-06 14:01 - 00107368 _____ (LogMeIn, Inc.) C:\Windows\system32\LMIRfsClientNP.dll
2014-06-23 17:26 - 2014-06-06 14:01 - 00092488 _____ (LogMeIn, Inc.) C:\Windows\system32\LMIinit.dll
2014-06-23 17:26 - 2014-06-06 14:01 - 00035656 _____ (LogMeIn, Inc.) C:\Windows\system32\LMIport.dll
2014-06-23 17:26 - 2014-02-07 16:29 - 00072216 _____ (LogMeIn, Inc.) C:\Windows\system32\Drivers\LMIRfsDriver.sys
2014-06-23 17:25 - 2014-06-23 17:25 - 00000000 ____D () C:\Program Files (x86)\LogMeIn
2014-06-22 19:28 - 2014-06-26 14:42 - 00000370 __RSH () C:\ProgramData\ntuser.pol
2014-06-22 19:28 - 2014-06-23 17:48 - 00000000 ____D () C:\ProgramData\Trend Micro
2014-06-22 19:27 - 2014-06-22 19:27 - 00000036 _____ () C:\Users\xanthin1\AppData\Local\housecall.guid.cache
2014-06-19 13:37 - 2014-06-19 13:37 - 00370943 _____ () C:\Users\xanthin1\Downloads\gmer.zip
2014-06-19 13:36 - 2014-06-19 13:36 - 00688992 ____R (Swearware) C:\Users\xanthin1\Downloads\dds.scr
2014-06-19 09:15 - 2014-06-19 09:16 - 00000000 ____D () C:\Users\xanthin1\Desktop\Documents\LLL
2014-06-18 20:36 - 2014-06-18 20:36 - 00002021 _____ () C:\Users\Public\Desktop\Adobe Reader X.lnk
2014-06-18 20:26 - 2014-06-18 20:26 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-06-18 20:20 - 2014-06-23 18:29 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-06-18 18:31 - 2014-06-18 18:31 - 00313521 ____S () C:\Windows\system32\nvhyx.kvz
2014-06-17 21:56 - 2014-06-17 21:56 - 00001547 _____ () C:\Users\xanthin1\Desktop\Windows Media Player.lnk
2014-06-10 19:45 - 2014-05-30 03:21 - 23414784 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-06-10 19:45 - 2014-05-30 03:02 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-06-10 19:45 - 2014-05-30 03:02 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-06-10 19:45 - 2014-05-30 02:45 - 02768384 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-06-10 19:45 - 2014-05-30 02:39 - 00548352 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-06-10 19:45 - 2014-05-30 02:39 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-06-10 19:45 - 2014-05-30 02:38 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-06-10 19:45 - 2014-05-30 02:28 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-06-10 19:45 - 2014-05-30 02:27 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-06-10 19:45 - 2014-05-30 02:24 - 00574976 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-06-10 19:45 - 2014-05-30 02:21 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-06-10 19:45 - 2014-05-30 02:21 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-06-10 19:45 - 2014-05-30 02:20 - 00752640 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-06-10 19:45 - 2014-05-30 02:18 - 17271296 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-06-10 19:45 - 2014-05-30 02:11 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-06-10 19:45 - 2014-05-30 02:08 - 05782528 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-06-10 19:45 - 2014-05-30 02:06 - 00452096 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-06-10 19:45 - 2014-05-30 02:02 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-06-10 19:45 - 2014-05-30 01:55 - 00038400 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2014-06-10 19:45 - 2014-05-30 01:49 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-06-10 19:45 - 2014-05-30 01:46 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-06-10 19:45 - 2014-05-30 01:44 - 00455168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2014-06-10 19:45 - 2014-05-30 01:44 - 00295424 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-06-10 19:45 - 2014-05-30 01:43 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-06-10 19:45 - 2014-05-30 01:42 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-06-10 19:45 - 2014-05-30 01:38 - 02179072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-06-10 19:45 - 2014-05-30 01:35 - 00608768 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-06-10 19:45 - 2014-05-30 01:34 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-06-10 19:45 - 2014-05-30 01:33 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-06-10 19:45 - 2014-05-30 01:30 - 00440832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-06-10 19:45 - 2014-05-30 01:29 - 00631808 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-06-10 19:45 - 2014-05-30 01:28 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-06-10 19:45 - 2014-05-30 01:27 - 00592896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-06-10 19:45 - 2014-05-30 01:24 - 01249280 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2014-06-10 19:45 - 2014-05-30 01:23 - 02040832 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-06-10 19:45 - 2014-05-30 01:16 - 00368128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2014-06-10 19:45 - 2014-05-30 01:10 - 00032256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll
2014-06-10 19:45 - 2014-05-30 01:06 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-06-10 19:45 - 2014-05-30 01:04 - 00069632 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2014-06-10 19:45 - 2014-05-30 01:02 - 00242688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2014-06-10 19:45 - 2014-05-30 00:56 - 04244992 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-06-10 19:45 - 2014-05-30 00:56 - 02266112 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-06-10 19:45 - 2014-05-30 00:54 - 00526336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-06-10 19:45 - 2014-05-30 00:50 - 01068032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll
2014-06-10 19:45 - 2014-05-30 00:49 - 01964544 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-06-10 19:45 - 2014-05-30 00:43 - 13522944 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-06-10 19:45 - 2014-05-30 00:40 - 11725312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-06-10 19:45 - 2014-05-30 00:30 - 01398272 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-06-10 19:45 - 2014-05-30 00:21 - 01790976 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-06-10 19:45 - 2014-05-30 00:15 - 01143296 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-06-10 19:45 - 2014-05-30 00:13 - 00846336 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-06-10 19:45 - 2014-05-30 00:13 - 00704512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2014-06-10 19:45 - 2014-04-24 19:34 - 00801280 _____ (Microsoft Corporation) C:\Windows\system32\usp10.dll
2014-06-10 19:45 - 2014-04-24 19:06 - 00626688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\usp10.dll
2014-06-10 19:45 - 2014-04-04 19:47 - 01903552 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\tcpip.sys
2014-06-10 19:45 - 2014-04-04 19:47 - 00288192 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\FWPKCLNT.SYS
2014-06-10 19:45 - 2014-03-26 07:44 - 02002432 _____ (Microsoft Corporation) C:\Windows\system32\msxml6.dll
2014-06-10 19:45 - 2014-03-26 07:44 - 01882112 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-06-10 19:45 - 2014-03-26 07:41 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\msxml6r.dll
2014-06-10 19:45 - 2014-03-26 07:41 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\msxml3r.dll
2014-06-10 19:45 - 2014-03-26 07:27 - 01389056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml6.dll
2014-06-10 19:45 - 2014-03-26 07:27 - 01237504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml3.dll
2014-06-10 19:45 - 2014-03-26 07:25 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml6r.dll
2014-06-10 19:45 - 2014-03-26 07:25 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml3r.dll
2014-06-10 19:44 - 2014-06-08 02:13 - 00506368 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-06-10 19:44 - 2014-06-08 02:08 - 00424448 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll

==================== One Month Modified Files and Folders =======

2014-06-30 09:20 - 2014-06-30 09:19 - 00010311 _____ () C:\Users\xanthin1\Desktop\FRST.txt
2014-06-30 09:19 - 2014-06-30 09:19 - 00000000 ____D () C:\FRST
2014-06-30 09:19 - 2014-06-26 16:24 - 00122584 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-06-30 09:18 - 2014-06-30 09:18 - 02083328 _____ (Farbar) C:\Users\xanthin1\Desktop\FRST64.exe
2014-06-30 09:18 - 2013-08-26 09:18 - 01664944 _____ () C:\Windows\WindowsUpdate.log
2014-06-30 09:16 - 2013-08-26 09:26 - 00000000 ____D () C:\Program Files (x86)\Dell DataSafe Local Backup
2014-06-30 09:15 - 2014-06-24 15:01 - 00000684 _____ () C:\Windows\setupact.log
2014-06-30 09:15 - 2014-06-23 17:26 - 00001006 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LogMeIn Client.lnk
2014-06-30 09:15 - 2014-06-23 17:26 - 00000990 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LogMeIn Control Panel.lnk
2014-06-30 09:15 - 2014-06-23 17:26 - 00000000 ____D () C:\ProgramData\LogMeIn
2014-06-30 09:15 - 2013-08-26 09:34 - 00000000 ____D () C:\Users\Default\AppData\Local\SoftThinks
2014-06-30 09:15 - 2013-08-26 09:34 - 00000000 ____D () C:\Users\Default User\AppData\Local\SoftThinks
2014-06-30 09:15 - 2009-07-13 22:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-06-28 12:59 - 2009-07-13 21:45 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-06-28 12:59 - 2009-07-13 21:45 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-06-27 10:33 - 2014-06-27 10:30 - 00017122 _____ () C:\Users\xanthin1\Desktop\dds.txt
2014-06-27 10:33 - 2014-06-27 10:30 - 00010723 _____ () C:\Users\xanthin1\Desktop\attach.txt
2014-06-27 10:29 - 2014-06-23 17:51 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-06-27 10:28 - 2014-06-27 10:28 - 00688992 ____R (Swearware) C:\Users\xanthin1\Desktop\dds.com
2014-06-27 10:24 - 2014-06-24 18:49 - 00000000 ____D () C:\Program Files\Microsoft Silverlight
2014-06-27 10:24 - 2014-06-24 18:49 - 00000000 ____D () C:\Program Files (x86)\Microsoft Silverlight
2014-06-26 19:27 - 2014-06-24 18:50 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Silverlight
2014-06-26 18:54 - 2014-06-26 18:54 - 01402880 _____ () C:\Users\xanthin1\Downloads\HijackThis.msi
2014-06-26 18:50 - 2014-06-26 18:46 - 00000000 ____D () C:\ProgramData\HitmanPro
2014-06-26 17:25 - 2013-09-29 14:46 - 00000000 ____D () C:\Users\xanthin1\Desktop\Documents\homeschool
2014-06-26 17:04 - 2014-06-26 16:21 - 00005084 _____ () C:\Users\xanthin1\Desktop\Rkill.txt
2014-06-26 16:51 - 2014-06-26 16:51 - 04181856 _____ (Kaspersky Lab ZAO) C:\Users\xanthin1\Desktop\tdsskiller.exe
2014-06-26 16:50 - 2014-06-26 16:50 - 01942776 _____ (Bleeping Computer, LLC) C:\Users\xanthin1\Desktop\rkill.exe
2014-06-26 16:24 - 2014-06-26 16:24 - 00001108 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-06-26 16:24 - 2014-06-26 16:24 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-06-26 16:24 - 2014-06-26 16:24 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-06-26 15:39 - 2014-06-26 15:39 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\Adobe
2014-06-26 15:04 - 2014-06-26 15:04 - 00002119 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Security Essentials.lnk
2014-06-26 15:04 - 2014-06-26 15:04 - 00001945 _____ () C:\Windows\epplauncher.mif
2014-06-26 15:04 - 2014-06-26 15:04 - 00000000 ____D () C:\Program Files\Microsoft Security Client
2014-06-26 15:04 - 2014-06-26 15:04 - 00000000 ____D () C:\Program Files (x86)\Microsoft Security Client
2014-06-26 15:00 - 2014-06-24 18:53 - 00336720 _____ () C:\Windows\PFRO.log
2014-06-26 15:00 - 2013-09-29 13:56 - 00000000 ____D () C:\ProgramData\AVAST Software
2014-06-26 14:42 - 2014-06-26 14:42 - 00000144 _____ () C:\Windows\system32\{A6D608F0-0BDE-491A-97AE-5C4B05D86E01}.bat
2014-06-26 14:42 - 2014-06-22 19:28 - 00000370 __RSH () C:\ProgramData\ntuser.pol
2014-06-24 19:33 - 2009-07-13 20:20 - 00000000 ____D () C:\Windows\rescache
2014-06-24 18:57 - 2014-06-24 18:57 - 00000000 ____D () C:\Program Files (x86)\Dell Digital Delivery
2014-06-24 18:57 - 2013-08-26 09:26 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Dell
2014-06-24 18:55 - 2013-09-29 13:38 - 00000000 ____D () C:\Users\xanthin1
2014-06-24 18:54 - 2014-06-24 18:54 - 00000451 _____ () C:\Windows\system32\{F33C3B9B-72AF-418A-B3FD-560646F7CDA2}.bat
2014-06-24 18:54 - 2009-07-13 21:45 - 00373440 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-06-24 18:54 - 2009-07-13 20:20 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories
2014-06-24 18:52 - 2009-07-13 20:20 - 00000000 ____D () C:\Windows\PolicyDefinitions
2014-06-24 18:52 - 2009-07-13 19:34 - 00000531 _____ () C:\Windows\win.ini
2014-06-24 18:49 - 2013-08-26 09:21 - 00000000 ____D () C:\Program Files\Intel
2014-06-24 18:47 - 2014-06-23 19:13 - 00000000 ____D () C:\Program Files (x86)\Microsoft Office
2014-06-24 15:01 - 2014-06-24 15:01 - 00000000 ____D () C:\Users\xanthin1\AppData\Roaming\PCDr
2014-06-24 15:01 - 2014-06-24 15:01 - 00000000 _____ () C:\Windows\setuperr.log
2014-06-24 15:01 - 2013-09-29 13:47 - 00003440 _____ () C:\Windows\System32\Tasks\PCDEventLauncherTask
2014-06-24 15:01 - 2013-09-29 13:39 - 00092296 _____ () C:\Users\xanthin1\AppData\Local\GDIPFONTCACHEV1.DAT
2014-06-24 15:01 - 2013-08-26 09:30 - 00000000 ____D () C:\Program Files\My Dell
2014-06-23 19:14 - 2013-09-29 14:08 - 00000376 _____ () C:\Windows\ODBC.INI
2014-06-23 19:13 - 2014-06-23 19:13 - 00000000 ____D () C:\Windows\PCHEALTH
2014-06-23 19:13 - 2014-06-23 19:13 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office
2014-06-23 19:13 - 2014-06-23 19:13 - 00000000 ____D () C:\Program Files (x86)\Microsoft ActiveSync
2014-06-23 19:13 - 2010-11-21 00:17 - 00000000 ____D () C:\Windows\ShellNew
2014-06-23 19:12 - 2009-07-13 20:20 - 00000000 ____D () C:\Windows\system
2014-06-23 19:04 - 2013-09-29 14:45 - 00000000 ____D () C:\Users\xanthin1\Desktop\Documents\geneology
2014-06-23 18:44 - 2009-07-13 20:20 - 00000000 __RHD () C:\Users\Default
2014-06-23 18:29 - 2014-06-18 20:20 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-06-23 18:24 - 2011-02-10 07:25 - 00000000 ____D () C:\Windows\panther
2014-06-23 17:54 - 2014-06-23 17:54 - 01039096 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsnx.sys.1403571268729
2014-06-23 17:54 - 2014-06-23 17:54 - 00423240 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsp.sys.1403571268729
2014-06-23 17:51 - 2014-06-23 17:51 - 00003768 _____ () C:\Windows\System32\Tasks\Adobe Flash Player Updater
2014-06-23 17:51 - 2013-08-26 09:18 - 00699056 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-06-23 17:51 - 2013-08-26 09:18 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-06-23 17:48 - 2014-06-22 19:28 - 00000000 ____D () C:\ProgramData\Trend Micro
2014-06-23 17:29 - 2014-06-23 17:29 - 00000020 ___SH () C:\Users\LogMeInRemoteUser\ntuser.ini
2014-06-23 17:26 - 2014-06-23 17:26 - 00001024 _____ () C:\.rnd
2014-06-23 17:26 - 2014-06-23 17:26 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\LogMeInIgnition
2014-06-23 17:26 - 2014-06-23 17:26 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\LogMeIn
2014-06-23 17:25 - 2014-06-23 17:25 - 00000000 ____D () C:\Program Files (x86)\LogMeIn
2014-06-22 19:33 - 2014-06-23 17:29 - 00000000 ____D () C:\Users\LogMeInRemoteUser\AppData\Local\SoftThinks
2014-06-22 19:28 - 2009-07-13 20:20 - 00000000 ___HD () C:\Windows\system32\GroupPolicy
2014-06-22 19:27 - 2014-06-22 19:27 - 00000036 _____ () C:\Users\xanthin1\AppData\Local\housecall.guid.cache
2014-06-19 13:54 - 2009-07-13 22:13 - 00781790 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-06-19 13:37 - 2014-06-19 13:37 - 00370943 _____ () C:\Users\xanthin1\Downloads\gmer.zip
2014-06-19 13:36 - 2014-06-19 13:36 - 00688992 ____R (Swearware) C:\Users\xanthin1\Downloads\dds.scr
2014-06-19 09:17 - 2013-09-29 14:43 - 00000000 ____D () C:\Users\xanthin1\Desktop\Documents\#written
2014-06-19 09:16 - 2014-06-19 09:15 - 00000000 ____D () C:\Users\xanthin1\Desktop\Documents\LLL
2014-06-18 20:36 - 2014-06-18 20:36 - 00002021 _____ () C:\Users\Public\Desktop\Adobe Reader X.lnk
2014-06-18 20:36 - 2013-08-26 09:31 - 00002441 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adobe Reader X.lnk
2014-06-18 20:26 - 2014-06-18 20:26 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-06-18 19:16 - 2013-09-29 13:57 - 01039096 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsnx.sys.1403144972404
2014-06-18 19:16 - 2013-09-29 13:57 - 00423240 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsp.sys.1403144972404
2014-06-18 19:16 - 2013-09-29 13:41 - 00000000 ____D () C:\Users\xanthin1\AppData\Local\VirtualStore
2014-06-18 19:13 - 2013-09-29 13:57 - 00000000 _____ () C:\Windows\SysWOW64\config.nt
2014-06-18 18:31 - 2014-06-18 18:31 - 00313521 ____S () C:\Windows\system32\nvhyx.kvz
2014-06-18 18:31 - 2009-07-13 20:20 - 00000000 ____D () C:\Windows\system32\sysprep
2014-06-17 21:56 - 2014-06-17 21:56 - 00001547 _____ () C:\Users\xanthin1\Desktop\Windows Media Player.lnk
2014-06-11 03:03 - 2013-09-29 14:03 - 00000000 ____D () C:\Windows\system32\MRT
2014-06-11 03:02 - 2013-09-29 14:03 - 95414520 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-06-11 03:01 - 2014-05-07 03:00 - 00000000 ___SD () C:\Windows\system32\CompatTel
2014-06-08 02:13 - 2014-06-10 19:44 - 00506368 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-06-08 02:08 - 2014-06-10 19:44 - 00424448 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
2014-06-06 14:01 - 2014-06-23 17:26 - 00107368 _____ (LogMeIn, Inc.) C:\Windows\system32\LMIRfsClientNP.dll
2014-06-06 14:01 - 2014-06-23 17:26 - 00092488 _____ (LogMeIn, Inc.) C:\Windows\system32\LMIinit.dll
2014-06-06 14:01 - 2014-06-23 17:26 - 00035656 _____ (LogMeIn, Inc.) C:\Windows\system32\LMIport.dll

==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll
[2010-11-20 20:24] - [2010-11-20 20:24] - 0524288 ____A (Microsoft Corporation) D25583E2673ECA56273C98A96F428BBC

 ATTENTION ======> If the system is having audio adware rpcss.dll is patched. Google the MD5, if the MD5 is unique the file is infected.
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed

LastRegBack: 2014-06-08 22:03

==================== End Of Log ============================

 

 

 

 

 

 

Farbar Recovery Scan Tool (x64) Version: 28-06-2014 02
Ran by xanthin1 at 2014-06-30 09:22:28
Running from C:\Users\xanthin1\Desktop
Boot Mode: Normal

================== Search Files: "rpcss.dll" =============

C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll
[2010-11-20 20:24][2010-11-20 20:24] 0512000 ____A (Microsoft Corporation) 5C627D1B1138676C0A7AB2C2C190D123 [File is signed]

C:\Windows\System32\rpcss.dll
[2010-11-20 20:24][2010-11-20 20:24] 0524288 ____A (Microsoft Corporation) D25583E2673ECA56273C98A96F428BBC

====== End Of Search ======

Attached Files



#4 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:10:37 AM

Posted 30 June 2014 - 06:35 PM

Hi,

 
Please download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.
 
 
Regards,
Georgi


cXfZ4wS.png


#5 xanthin1

xanthin1
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:37 AM

Posted 30 June 2014 - 06:57 PM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 28-06-2014 02
Ran by xanthin1 at 2014-06-30 16:52:43 Run:1
Running from C:\Users\xanthin1\Desktop
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
start
ShellIconOverlayIdentifiers: 00avast -> {472083B0-C522-11CF-8763-00608CC02F24} =>  No File
2014-06-23 17:54 - 2014-06-23 17:54 - 01039096 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsnx.sys.1403571268729
2014-06-23 17:54 - 2014-06-23 17:54 - 00423240 _____ (AVAST Software) C:\Windows\system32\Drivers\aswsp.sys.1403571268729
2014-06-26 15:00 - 2013-09-29 13:56 - 00000000 ____D () C:\ProgramData\AVAST Software
Toolbar: HKLM - No Name - {318A227B-5E9F-45bd-8999-7F8F10CA4CF5} -  No File
S3 MFE_RR; \??\C:\Users\xanthin1\AppData\Local\Temp\mfe_rr.sys [X]
cmd: C:\ProgramData\HitmanPro\Logs\*.*
cmd: type C:\Users\xanthin1\Desktop\Rkill.txt
2014-06-18 18:31 - 2014-06-18 18:31 - 00313521 ____S () C:\Windows\system32\nvhyx.kvz
Replace: C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll C:\Windows\System32\rpcss.dll
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\64379110.sys => ""="Driver"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\64379110.sys => ""="Driver"
end
*****************

'HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\00avast' => Key deleted successfully.
'HKLM\Software\Classes\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}'=> Key not found.
C:\Windows\system32\Drivers\aswsnx.sys.1403571268729 => Moved successfully.
C:\Windows\system32\Drivers\aswsp.sys.1403571268729 => Moved successfully.
C:\ProgramData\AVAST Software => Moved successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\\{318A227B-5E9F-45bd-8999-7F8F10CA4CF5} => value deleted successfully.
'HKCR\CLSID\{318A227B-5E9F-45bd-8999-7F8F10CA4CF5}'=> Key not found.
MFE_RR => Service deleted successfully.

=========  C:\ProgramData\HitmanPro\Logs\*.* =========

The system cannot find the path specified.

========= End of CMD: =========

=========  type C:\Users\xanthin1\Desktop\Rkill.txt =========

Rkill 2.6.7 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 06/26/2014 05:03:13 PM in x64 mode. (Safe Mode)
Windows Version: Windows 7 Professional Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * Base Filtering Engine (BFE) is not Running.
   Startup Type set to: Automatic

 * DHCP Client (Dhcp) is not Running.
   Startup Type set to: Automatic

 * DNS Client (Dnscache) is not Running.
   Startup Type set to: Automatic

 * COM+ Event System (EventSystem) is not Running.
   Startup Type set to: Automatic

 * Windows Firewall (MpsSvc) is not Running.
   Startup Type set to: Automatic

 * Network Connections (Netman) is not Running.
   Startup Type set to: Manual

 * Network Store Interface Service (nsi) is not Running.
   Startup Type set to: Automatic

 * Security Center (wscsvc) is not Running.
   Startup Type set to: Automatic (Delayed Start)

 * Windows Update (wuauserv) is not Running.
   Startup Type set to: Automatic (Delayed Start)

 * Ancillary Function Driver for Winsock (AFD) is not Running.
   Startup Type set to: System

 * Windows Firewall Authorization Driver (mpsdrv) is not Running.
   Startup Type set to: Manual

 * NetBT (NetBT) is not Running.
   Startup Type set to: System

 * NSI proxy service driver. (nsiproxy) is not Running.
   Startup Type set to: System

 * NetIO Legacy TDI Support Driver (tdx) is not Running.
   Startup Type set to: System

Searching for Missing Digital Signatures:

 * C:\Windows\System32\rpcss.dll : 524,288 : 11/20/2010 08:24 PM : d25583e2673eca56273c98a96f428bbc [NoSig]
 +-> C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll : 512,000 : 11/20/2010 08:24 PM : 5c627d1b1138676c0a7ab2c2c190d123 [Pos Repl]

Checking HOSTS File:

 * No issues found.

Program finished at: 06/26/2014 05:04:16 PM
Execution time: 0 hours(s), 1 minute(s), and 2 seconds(s)

========= End of CMD: =========

Could not move "C:\Windows\system32\nvhyx.kvz" => Scheduled to move on reboot.
C:\Windows\System32\rpcss.dll => Moved successfully.
C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll copied successfully to C:\Windows\System32\rpcss.dll
'HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal\64379110.sys' => Key deleted successfully.
'HKLM\System\CurrentControlSet\Control\SafeBoot\Network\64379110.sys' => Key deleted successfully.

=> Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-06-30 16:55:30)<=

C:\Windows\system32\nvhyx.kvz => Is moved successfully.

==== End of Fixlog ====



#6 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:10:37 AM

Posted 30 June 2014 - 11:11 PM

Hi,

 

How are things now?

 

 

Although we managed to clean the infection I want to make sure there is nothing lurking on the system so just in case I want you to go through these steps:

 

The most of them should take no more than 5 minutes each (but the time they take to complete can vary depending on the size of your hard and the speed of your computer).

 

Note: run them from Normal Mode (and not from Safe Mode).

 

 

STEP 1

 

 

  • Please download RKill by Grinler from the link below and save it to your desktop.

    Rkill
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply.
  • A log pops up at the end of the run. This log file is located at C:\rkill.log.
  • Please post the log in your next reply.

 

 

STEP 2

 

 

  • Please download RogueKillerX64.exe and save to the desktop.
  • Close all windows and browsers
  • Right-click the program and select 'Run as Administrator'
  • Press the scan button.
  • A report opens on the desktop named - RKreport.txt
  • Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 3
 

 

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
     
  • Put a checkmark beside loaded modules.
    Sbf88.png
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
     
  • Click the Start Scan button.
     
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    67776163.jpg
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    62117367.jpg
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 4

 

 

Please download Malwarebytes Anti-Malware to your desktop.
 

  • Double-click mb3-setup-1878.1878-3.5.1.2522.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.
  • On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • With some infections, you may see this message box.
    • 'Could not load DDA driver'
  • Click 'Yes' to this message, to allow the driver to load after a restart.
  • Allow the computer to restart. Continue with the rest of these instructions.
  • When the scan is complete, click Apply Actions.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

 

STEP 5

 

 

1.Please download HitmanPro.

  • For 32-bit Operating System - dEMD6.gif.
  • This is the mirror - dEMD6.gif
  • For 64-bit Operating System - dEMD6.gif
  • This is the mirror - dEMD6.gif

2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).

Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.

3.Click on the next button. You must agree with the terms of EULA. (if asked)

4.Check the box beside "No, I only want to perform a one-time scan to check this computer".

5.Click on the next button.

6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.

7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!
 
8.Click on the next button.

9.Click on the "Save Log" button.

10.Save that file to your desktop and post the content of that file in your next reply.
 
Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro

Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.

 

 

STEP 6

 

 

I'd like us to scan your machine with ESET OnlineScan


  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Run ESET Online Scanner button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetSmartInstall.png to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the esetSmartInstallDesktopIcon.png icon on your desktop.
  • Check esetAcceptTerms.png
  • Click the esetStart.png button.
  • Accept any security warnings from your browser.
  • Make sure that the option Remove found threats is NOT checked, and the option Scan archives is  checked.
  • Now click on Advanced Settings and select the following:

    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push esetListThreats.png
  • Push esetExport.png, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the esetBack.png button.
  • Push esetFinish.png

 

 

 

STEP 7

 

 

Download Security Check by screen317 from here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

 

and then if there aren't any issues left I'll give you my final recommendations. :)

 

 

Regards,

Georgi


cXfZ4wS.png


#7 xanthin1

xanthin1
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:37 AM

Posted 01 July 2014 - 12:31 PM

Here are the results of the various scans

 

Rkill 2.6.7 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 07/01/2014 09:05:28 AM in x64 mode.
Windows Version: Windows 7 Professional Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * No issues found.

Program finished at: 07/01/2014 09:06:18 AM
Execution time: 0 hours(s), 0 minute(s), and 49 seconds(s)

 

http://pastebin.com/mdDm0yY4

 

http://pastebin.com/pBphE3Hk

 

Malwarebytes Anti-Malware

www.malwarebytes.org

 

Scan Date: 7/1/2014

Scan Time: 9:27:46 AM

Logfile:

Administrator: Yes

 

Version: 2.00.2.1012

Malware Database: v2014.07.01.06

Rootkit Database: v2014.07.01.01

License: Trial

Malware Protection: Enabled

Malicious Website Protection: Enabled

Self-protection: Disabled

 

OS: Windows 7 Service Pack 1

CPU: x64

File System: NTFS

User: xanthin1

 

Scan Type: Threat Scan

Result: Completed

Objects Scanned: 299177

Time Elapsed: 6 min, 4 sec

 

Memory: Enabled

Startup: Enabled

Filesystem: Enabled

Archives: Enabled

Rootkits: Enabled

Heuristics: Enabled

PUP: Enabled

PUM: Enabled

 

Processes: 0

(No malicious items detected)

 

Modules: 0

(No malicious items detected)

 

Registry Keys: 0

(No malicious items detected)

 

Registry Values: 0

(No malicious items detected)

 

Registry Data: 0

(No malicious items detected)

 

Folders: 0

(No malicious items detected)

 

Files: 0

(No malicious items detected)

 

Physical Sectors: 0

(No malicious items detected)

 

 

(end)

 

HitmanPro 3.7.9.220
www.hitmanpro.com
   Computer name . . . . : XANTHIN1-PC
   Windows . . . . . . . : 6.1.1.7601.X64/2
   User name . . . . . . : xanthin1-PC\xanthin1
   UAC . . . . . . . . . : Enabled
   License . . . . . . . : Free
   Scan date . . . . . . : 2014-07-01 09:38:03
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 2m 12s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No
   Threats . . . . . . . : 0
   Traces  . . . . . . . : 3
   Objects scanned . . . : 1,435,722
   Files scanned . . . . : 76,223
   Remnants scanned  . . : 314,872 files / 1,044,627 keys
Suspicious files ____________________________________________________________
   C:\$Recycle.Bin\S-1-5-21-3338560104-2605595989-2742162462-1001\$RX953SF.exe
      Size . . . . . . . : 1,073,664 bytes
      Age  . . . . . . . : 1.0 days (2014-06-30 09:18:09)
      Entropy  . . . . . : 8.0
      SHA-256  . . . . . : 9804725E8EDD0743468B803A92B4BC4C8BFCAA2A90282E33E7090B271EE20F87
      Needs elevation  . : Yes
      Fuzzy  . . . . . . : 24.0
         Program has no publisher information but prompts the user for permission elevation.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Time indicates that the file appeared recently on this computer.
      Forensic Cluster
         -122.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\weekly-features[2].htm
         -120.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\validateA1TUKZK8.htm
         -119.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\videos[6].htm
         -119.7s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{0DD05F32-171A-4E09-9E13-1BBB9664D8D8}
         -119.4s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{895C3181-43E8-44D3-8EC6-B79A4F19520D}
         -119.1s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{FFCD1E14-45EF-4224-97D7-EAE808B9EA62}
         -115.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PlayerSeed[3].js
         -115.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\font-awesome[3].css
         -115.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\remote-login[4].js
         -115.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\validateKBXCQBXC.htm
         -115.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[5].js
         -115.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[7].css
         -114.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[8].css
         -113.7s C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2427C246DCF85A06DD675914EDA68038_EEE52A74DEE31B064E156E492FD05217
         -113.6s C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2427C246DCF85A06DD675914EDA68038_EEE52A74DEE31B064E156E492FD05217
         -113.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5507V1OO1.js
         -113.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[9].css
         -112.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IE9WIOILQBP.js
         -112.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\wellness-archives[4].htm
         -111.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\css6VNMU52M.css
         -110.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\validateN0RUGBHY.htm
         -110.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\css5JRID26P.css
         -110.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\beaconZTIU8D8H.js
         -109.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5IM1GYRIF.js
         -85.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\combo[3].css
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\jlo-knee_635x250_1404069483[1].jpg
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\378[1].png
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\hobby_lobby_120x48_1394031926[1].jpg
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\388[1].png
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\jlo-knee_120x48_1404069483[1].jpg
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\transformers-lines_120x48_1404082424[1].jpg
         -82.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\darlings_120x48_1404085689[1].jpg
         -82.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\vampire_120x48_1404094703[1].jpg
         -82.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\ussoccer2[1].jpg
         -82.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014062320140630\
         -82.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014063020140701\
         -82.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\csync[1].txt
         -82.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014062320140630\container.dat
         -82.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014063020140701\container.dat
         -81.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\yi[2].gif
         -80.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\referafriend[1].gif
         -80.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\startpage[1].gif
         -79.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fR4O9XN9B.txt
         -78.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\4896097[1].jpg
         -78.3s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\GTEQK37Z.txt
         -78.3s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\1MU3O5M7.txt
         -74.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\clientInfo[1].htm
         -73.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\index[1].htm
         -70.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fBAZZ5XFN.txt
         -70.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fZYZX171R.txt
         -70.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fYRSNYI1P.txt
         -70.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\ron_earthlink_2013;sz=160x600;ord=836620213[1].js
         -70.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\adview[4].htm
         -70.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\adview[5].htm
         -70.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\google_ad_left_tower[1].js
         -70.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\jload[1].js
         -70.1s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\XKG343WB.txt
         -69.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\253768[1].png
         -69.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\pixel[5].png
         -69.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\fDXAI5BFD.txt
         -69.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\9780525478812[1].gif
         -69.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\9780142402511[1].gif
         -69.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\9780812980028[1].jpg
         -69.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\YEWRR1FN.gif
         -69.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\beacon[1].gif
         -69.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\dt[4].gif
         -69.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\f4945CVNP.txt
         -69.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\activeviewOBTA1IYJ.gif
         -69.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\activeviewBIGQD8X5.gif
         -68.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\HIJFFGAV.gif
         -68.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\pixel[1].htm
         -68.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2Z6OXNA\dt[2].gif
         -68.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\log;tx=cm-31221901734_1404145022;it=0;vt=0;ic=0;atf=1;pv=1;fv=0;seq=2;et=L;cid=13702203b203480;ord=405553[1].gif
         -68.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\datapair[3].gif
         -67.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\px[1]
         -67.6s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\N4J4KGAQ.txt
         -67.6s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\1T0YWA9I.txt
         -67.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\sci[1].gif
         -66.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\gif[1].gif
         -66.4s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\TA018V1F.txt
         -56.1s C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\0a1d1f73a0ee17f6cfc3a6634acb27b3_a4b24e32-efef-4646-9922-c9fe45f6adde
         -55.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\dt[3].gif
         -55.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\msg[1].htm
         -54.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\fWKCKHIIE.txt
         -54.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\fNX2SNRRB.txt
         -53.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\f0K4PUFL7.txt
         -53.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\flook_kv;cmsid=;key=;cmn=cm;sz=728x90;ord=186252038[1].js
         -53.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\adview[3].htm
         -53.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\google_ad_top_banner[1].js
         -53.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\surly[1].js
         -53.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\jload[2].js
         -53.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\pixel[1].png
         -53.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fNU30OA3X.txt
         -53.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\PUS9HZFV.gif
         -53.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\dt[4].gif
         -52.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\beacon[1].gif
         -52.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\f86GB7RNR.txt
         -52.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\31080408_1cbbde1694382dc1688a8f43ea37ef10_281289207_creative_override[1].js
         -52.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\activeview4MF20NLW.gif
         -52.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\TCEGN2CQ.gif
         -52.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\pixel[1].htm
         -52.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\ads[1].htm
         -52.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\dt[3].gif
         -51.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\dt[8].gif
         -51.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\11235388431326792780[1].jpg
         -51.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\s[1].htm
         -51.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\log;tx=cm-31701506987_1404145039;it=0;vt=0;ic=0;atf=1;pv=1;fv=0;seq=2;et=L;cid=13702203b203480;ord=831398[1].gif
         -51.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2Z6OXNA\si[1].htm
         -50.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\activeviewSOU6XNPZ.gif
         -48.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\dt[5].gif
         -47.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\dt[4].gif
         -46.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\av-383888[1].jpg
         -46.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\welcome[1].gif
         -45.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\qnfKk[1].jpg
         -45.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\__utm[7].gif
         -45.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\paypal[1].htm
         -45.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\paypal[1].gif
         -45.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\cb=gapi[3].js
         -45.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\index[1].gif
         -44.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\cb=gapi[3].js
         -44.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\cb=gapi[1].js
         -44.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\cb=gapi[2].js
         -30.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\farbar-recovery-scan-tool[1].htm
         -29.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\disclaimer[1].png
         -29.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\scanning[1].png
         -29.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\icon1337952077[1].png
         -29.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\icon1337954655[1].png
         -29.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\log[1].png
         -29.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\__utmU3DNFFKV.gif
         -28.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\cb=gapi[3].js
         -28.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\count[2].js
         -5.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\81[1].htm
         -5.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\__utm[2].gif
          0.0s C:\$Recycle.Bin\S-1-5-21-3338560104-2605595989-2742162462-1001\$RX953SF.exe
          1.7s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{C1341FD4-5A35-4FC4-B9E6-E44F031380BF}
          6.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5T0H32C7F.js
          6.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\find-inspiration-embrace-your-passions[1].htm
         15.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\__utm[7].gif
         17.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\82[1].htm
         17.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\__utm[6].gif
         19.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5DVEWLQQZ.js
         19.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\recaptcha3YQ0ZMZB.js
         20.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gaT35WRBA4.js
         20.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\beaconXBR47OGZ.js
         21.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ga0DASEDTP.js
         21.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajsHJE7OCLA.js
         21.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\css1LBDWQA1.css
         21.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\recaptcha7NU1Z3VL.js
         21.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.fancybox[2].css
         21.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gaGZB4U1P4.js
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jloadG8ENO6WR.js
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\recaptchaY9HB8AWY.js
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\page-style[2].css
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\kcarousel-style[2].css
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\quant2JMRST38.js
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\quant8ZMF247X.js
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0AKsP294HTD-nvJgucYTaGfQcKutQXcIrRfyR5jdjY8QQG2IUUY.eot
         21.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jloadC16O9562.js
         22.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\templates[2].css
         22.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\load6AHAERNG.js
         23.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PGmIi7JRPG4vvRc-zWbPZd0kxAEXHadva_wnuyT7QB4S3L9M6LX.js
         23.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\marker[2].css
         23.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\style[5].css
         23.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PGmIi7JRPG4vvRc-zWbPZd0kxAEXHadva_wnuyT7QB4J16DM076.js
         23.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\widgetsI479Z999.js
         23.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PGmIi7JRPG4vvRc-zWbPZd0kxAEXHadva_wnuyT7QB4DGDX59P2.js
         23.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\pinitIU2UURQU.js
         23.9s C:\Users\xanthin1\Desktop\FRST64.exe
         24.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\fontawesome-webfontSTXL0U28.eot
         24.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\wpcomments[2].css
         24.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\s-BiyweUPV0v-yRb-cjciFQlYEbsez9cZjKsNMjLOwMTLL85O6A.eot
         24.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\mqvGe0REcQNb_tfYSePALA3VCCHT7Z.eot
         24.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\fbseo-style[2].css
         25.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jqueryZR51XZHO.js
         25.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\allC91YUBV4.js
         28.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\colorbox[2].css
         29.8s C:\Windows\System32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{697ba2b0-4b77-4058-85e8-89d46a6f32f2}\
         29.8s C:\Windows\System32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{697ba2b0-4b77-4058-85e8-89d46a6f32f2}\snapshot.etl
         29.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VI_videos,videoadpage,spryliving[5].htm
         30.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\reload7DCZ3J67.js
         32.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Zd2E9abXLFGSr9G3YK2MsMd-vqFyeuiaDIrtTqsKQLw1D9UVZAB.eot
         32.6s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{149D6167-C7C0-47E7-9495-C0C203DB1C33}
         34.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\xRppWELPO9mGIONBARvbXgWTOG0O1B.eot
         34.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SenseHandler[7].js
         34.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\audiences[8].js
         35.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FiveminCookieCacheKBDT5H6J.js
         46.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ssl2[3].htm
         46.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.carouFredSel-6.2.1-packed[2].js
         46.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\pshandler[2].js
         46.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VI_videos,videoadpage,spryliving[6].htm
         46.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\222[8].json
         46.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.ba-throttle-debounce.min[2].js
         46.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ws-0E1B7608[3].js
         46.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\w[3].js
         46.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ggv2[4].js
         46.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[6].js
         47.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\plusoneT3TK78CY.js
         47.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gprofiles[6].js
         48.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5gWwNxgds7YXZCRqZwhDGg[3].eot
         49.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\216PQWFMHVA.json
         49.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\era_rlP2WI0G9B.js
         49.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\mqvGe0REcQNb_tfYSePALA1Y72EPX6.eot
         50.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\212SOMZSKK5.json
         50.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\video[7].htm
         50.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.mousewheel.min[2].js
         50.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\pinit_mainB4L4FTAX.js
         50.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.transit.min[2].js
         50.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\wpgroho[6].js
         50.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.touchSwipe.min[2].js
         62.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CREReqScript[1].js
         62.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FiveminCookieCacheEBB4DRST.js
         63.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\app_kitchensink.min[4].js
         63.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagPC0DGKM1.js
         64.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Zd2E9abXLFGSr9G3YK2MsMd-vqFyeuiaDIrtTqsKQLw9ED8CKMD.eot
         64.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\reloadZSM5QKTB.js
         64.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DOHAK8DimZJeSQQDpH-4yw[4].eot
         65.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2501VB5N705.json
         65.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\xRppWELPO9mGIONBARvbXgCA8ESBLB.eot
         65.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\214XR4LIJAR.json
         65.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.fancybox[2].js
         65.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\showadDGI9E6WK.htm
         65.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagPJRGXOC7.js
         65.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\reloadS2PJBKTQ.js
         65.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\cb=gapi2VKVU142.js
         65.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\cb=gapi2VKVU142.js
         66.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\comment-reply.min[3].js
         72.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\aBQVVQvnHeKhkWtMdHDrBAQYG9CYCX.eot
         76.2s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{3A496AD7-F95A-4DC5-9EBA-A3C2A3FE530D}
         76.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2158Q6FSNJB.json
         77.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajs7Q2IOEZI.js
         78.4s C:\Windows\Prefetch\FRST.EXE-75A69D4E.pf
         79.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\scripts[6].js
         85.8s C:\$Recycle.Bin\S-1-5-21-3338560104-2605595989-2742162462-1001\$IX953SF.exe
         88.9s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\MetaStore\2\93\0122E5A982847B05.dat
         88.9s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\MetaStore\2\93\
         88.9s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\MetaStore\2\93\
         89.1s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{111DCCF1-212D-45A9-BAB2-3273AF1EFBBD}
         94.2s C:\FRST\Hives\
         94.2s C:\FRST\Logs\
         94.2s C:\FRST\
         94.2s C:\FRST\Quarantine\
         95.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ticker[3].js
         95.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ticker[3].js
         95.2s C:\FRST\Hives\ERDNT.INF
         95.2s C:\FRST\Hives\ERDNT.CON
         95.2s C:\FRST\Hives\SOFTWARE
         95.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajsC53H5HW4.js
         95.6s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{20E48BA7-10C4-4B4D-BE8E-6703BB3EC926}
         95.6s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{20E48BA7-10C4-4B4D-BE8E-6703BB3EC926}
         95.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagPOM5ADK9.js
         95.8s C:\FRST\Hives\SYSTEM
         95.9s C:\FRST\Hives\DEFAULT
         96.0s C:\FRST\Hives\SECURITY
         96.0s C:\FRST\Hives\SAM
         96.0s C:\FRST\Hives\Users\
         96.0s C:\FRST\Hives\Users\00000001\
         96.0s C:\FRST\Hives\Users\00000001\NTUSER.DAT
         96.0s C:\FRST\Hives\Users\00000001\NTUSER.DAT
         96.0s C:\FRST\Hives\Users\00000002\
         96.0s C:\FRST\Hives\Users\00000002\UsrClass.dat
         96.0s C:\FRST\Hives\COMPONENTS
         96.0s C:\FRST\Hives\COMPONENTS
         96.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagS3PMTE2J.js
         96.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\beaconD3FM3MJG.js
         96.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\respond.min[3].js
         96.8s C:\FRST\Hives\ERDNT.EXE
         96.8s C:\FRST\Hives\ERDNT.EXE
         96.9s C:\FRST\Hives\ERDNTWIN.LOC
         96.9s C:\FRST\Hives\ERDNTDOS.LOC
         97.0s C:\Windows\Prefetch\ERUNT.EXE-45966165.pf
         97.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.tweet[2].js
         97.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.tweet[2].js
         97.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tag54S8T5H9.js
         98.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\adfOLGY7HEU.js
         98.7s C:\Windows\Prefetch\FRST64.EXE-72F01750.pf
         99.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\retina[3].js
         99.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\retina[3].js
         99.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2135OEHX5JT.json
         101.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\history.adapter.jquery[2].js
         101.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         101.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         101.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         101.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         101.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\history[2].js
         103.5s C:\Users\xanthin1\Desktop\FRST.txt
         105.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\226[6].json
         105.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagDH4X7FZV.js
         109.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajs0V6G3GD1.js
         111.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tps-transition-slide[2].js
         112.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\224[8].json
         112.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gallery[2].js
         112.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\225AK0K36ZY.json
         112.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\colorbox[2].js
         112.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\adfJ4IVNYH3.js
         113.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajsORU56HLT.js
         113.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.carouFredSel-6.2.1[2].js
         113.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.elastislide[2].js
         113.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\225SPEX7X86.json
         113.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagT6QKCV3K.js
         133.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\253[8].json
         139.2s C:\Users\xanthin1\Desktop\Addition.txt
         144.1s C:\Windows\Prefetch\MOD_FRST.EXE-D328E2AD.pf
         158.3s C:\FRST\Logs\Addition.txt
         158.3s C:\Windows\Prefetch\WEVTUTIL.EXE-1E154F39.pf
         158.5s C:\FRST\Logs\FRST_30-06-2014_09-20-47.txt
   C:\Users\xanthin1\Desktop\FRST64.exe
      Size . . . . . . . : 2,083,328 bytes
      Age  . . . . . . . : 1.0 days (2014-06-30 09:18:32)
      Entropy  . . . . . : 7.5
      SHA-256  . . . . . : CC449B189EC631A9A65BDA95D2386D193E6AD8BAD7ED4C551B2DF2A39016D860
      Needs elevation  . : Yes
      Fuzzy  . . . . . . : 24.0
         Program has no publisher information but prompts the user for permission elevation.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Time indicates that the file appeared recently on this computer.
      Forensic Cluster
         -146.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\weekly-features[2].htm
         -144.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\validateA1TUKZK8.htm
         -143.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\videos[6].htm
         -143.6s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{0DD05F32-171A-4E09-9E13-1BBB9664D8D8}
         -143.2s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{895C3181-43E8-44D3-8EC6-B79A4F19520D}
         -142.9s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{FFCD1E14-45EF-4224-97D7-EAE808B9EA62}
         -139.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PlayerSeed[3].js
         -139.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\font-awesome[3].css
         -139.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\remote-login[4].js
         -139.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\validateKBXCQBXC.htm
         -139.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[5].js
         -138.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[7].css
         -138.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[8].css
         -137.6s C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2427C246DCF85A06DD675914EDA68038_EEE52A74DEE31B064E156E492FD05217
         -137.5s C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2427C246DCF85A06DD675914EDA68038_EEE52A74DEE31B064E156E492FD05217
         -137.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5507V1OO1.js
         -137.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[9].css
         -136.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IE9WIOILQBP.js
         -136.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\wellness-archives[4].htm
         -135.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\css6VNMU52M.css
         -134.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\validateN0RUGBHY.htm
         -134.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\css5JRID26P.css
         -134.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\beaconZTIU8D8H.js
         -133.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5IM1GYRIF.js
         -109.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\combo[3].css
         -106.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\jlo-knee_635x250_1404069483[1].jpg
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\378[1].png
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\hobby_lobby_120x48_1394031926[1].jpg
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\388[1].png
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\jlo-knee_120x48_1404069483[1].jpg
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\transformers-lines_120x48_1404082424[1].jpg
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TQIS8YZF\darlings_120x48_1404085689[1].jpg
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\vampire_120x48_1404094703[1].jpg
         -106.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\ussoccer2[1].jpg
         -106.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014062320140630\
         -106.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014063020140701\
         -106.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\csync[1].txt
         -106.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014062320140630\container.dat
         -106.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012014063020140701\container.dat
         -104.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\yi[2].gif
         -104.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\referafriend[1].gif
         -104.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\startpage[1].gif
         -102.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fR4O9XN9B.txt
         -102.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\4896097[1].jpg
         -102.1s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\GTEQK37Z.txt
         -102.1s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\1MU3O5M7.txt
         -98.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\clientInfo[1].htm
         -97.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\index[1].htm
         -94.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fBAZZ5XFN.txt
         -94.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fZYZX171R.txt
         -94.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fYRSNYI1P.txt
         -94.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\ron_earthlink_2013;sz=160x600;ord=836620213[1].js
         -94.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\adview[4].htm
         -94.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\adview[5].htm
         -94.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\google_ad_left_tower[1].js
         -93.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\jload[1].js
         -93.9s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\XKG343WB.txt
         -93.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\253768[1].png
         -93.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\pixel[5].png
         -93.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\fDXAI5BFD.txt
         -93.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\9780525478812[1].gif
         -93.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\9780142402511[1].gif
         -93.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\9780812980028[1].jpg
         -93.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\YEWRR1FN.gif
         -93.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\beacon[1].gif
         -93.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\dt[4].gif
         -92.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\f4945CVNP.txt
         -92.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\activeviewOBTA1IYJ.gif
         -92.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\activeviewBIGQD8X5.gif
         -92.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\HIJFFGAV.gif
         -92.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\pixel[1].htm
         -92.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2Z6OXNA\dt[2].gif
         -92.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\log;tx=cm-31221901734_1404145022;it=0;vt=0;ic=0;atf=1;pv=1;fv=0;seq=2;et=L;cid=13702203b203480;ord=405553[1].gif
         -91.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\datapair[3].gif
         -91.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\px[1]
         -91.4s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\N4J4KGAQ.txt
         -91.4s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\1T0YWA9I.txt
         -91.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\sci[1].gif
         -90.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\gif[1].gif
         -90.2s C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\Low\TA018V1F.txt
         -80.0s C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\0a1d1f73a0ee17f6cfc3a6634acb27b3_a4b24e32-efef-4646-9922-c9fe45f6adde
         -79.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\dt[3].gif
         -79.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\msg[1].htm
         -77.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\fWKCKHIIE.txt
         -77.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\fNX2SNRRB.txt
         -77.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\f0K4PUFL7.txt
         -77.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\flook_kv;cmsid=;key=;cmn=cm;sz=728x90;ord=186252038[1].js
         -77.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\adview[3].htm
         -77.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\google_ad_top_banner[1].js
         -77.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\surly[1].js
         -77.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\jload[2].js
         -77.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\pixel[1].png
         -77.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TKVGJP83\fNU30OA3X.txt
         -76.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\PUS9HZFV.gif
         -76.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\dt[4].gif
         -76.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\beacon[1].gif
         -76.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\f86GB7RNR.txt
         -76.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\31080408_1cbbde1694382dc1688a8f43ea37ef10_281289207_creative_override[1].js
         -76.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\activeview4MF20NLW.gif
         -76.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\TCEGN2CQ.gif
         -76.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\pixel[1].htm
         -76.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\ads[1].htm
         -76.0s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7GW54M5U\dt[3].gif
         -75.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\dt[8].gif
         -75.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\11235388431326792780[1].jpg
         -75.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\s[1].htm
         -75.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\log;tx=cm-31701506987_1404145039;it=0;vt=0;ic=0;atf=1;pv=1;fv=0;seq=2;et=L;cid=13702203b203480;ord=831398[1].gif
         -75.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2Z6OXNA\si[1].htm
         -74.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\activeviewSOU6XNPZ.gif
         -71.9s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\dt[5].gif
         -71.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\dt[4].gif
         -70.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\av-383888[1].jpg
         -70.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\welcome[1].gif
         -69.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\qnfKk[1].jpg
         -69.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\__utm[7].gif
         -69.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\paypal[1].htm
         -69.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PAMSV2QF\paypal[1].gif
         -69.3s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\cb=gapi[3].js
         -69.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\index[1].gif
         -68.7s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7ZFA6HF2\cb=gapi[3].js
         -68.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\cb=gapi[1].js
         -68.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2V06VE0I\cb=gapi[2].js
         -53.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CKF6F6I0\farbar-recovery-scan-tool[1].htm
         -53.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\disclaimer[1].png
         -53.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\scanning[1].png
         -53.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\icon1337952077[1].png
         -53.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9REJUBCF\icon1337954655[1].png
         -53.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PRUMMV75\log[1].png
         -53.1s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\24Z32WZX\__utmU3DNFFKV.gif
         -52.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\cb=gapi[3].js
         -52.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CGJW3Y1L\count[2].js
         -29.6s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\81[1].htm
         -29.5s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2KEIWFXG\__utm[2].gif
         -23.9s C:\$Recycle.Bin\S-1-5-21-3338560104-2605595989-2742162462-1001\$RX953SF.exe
         -22.1s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{C1341FD4-5A35-4FC4-B9E6-E44F031380BF}
         -17.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5T0H32C7F.js
         -17.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\find-inspiration-embrace-your-passions[1].htm
         -8.8s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5Q4NRB1O\__utm[7].gif
         -6.4s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\SMI2VTAP\82[1].htm
         -6.2s C:\Users\xanthin1\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\F0F44L5K\__utm[6].gif
         -4.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\html5DVEWLQQZ.js
         -4.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\recaptcha3YQ0ZMZB.js
         -3.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gaT35WRBA4.js
         -3.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\beaconXBR47OGZ.js
         -2.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ga0DASEDTP.js
         -2.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajsHJE7OCLA.js
         -2.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\css1LBDWQA1.css
         -2.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\recaptcha7NU1Z3VL.js
         -2.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.fancybox[2].css
         -2.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gaGZB4U1P4.js
         -2.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jloadG8ENO6WR.js
         -2.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\recaptchaY9HB8AWY.js
         -1.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\page-style[2].css
         -1.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\kcarousel-style[2].css
         -1.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\quant2JMRST38.js
         -1.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\quant8ZMF247X.js
         -1.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0AKsP294HTD-nvJgucYTaGfQcKutQXcIrRfyR5jdjY8QQG2IUUY.eot
         -1.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jloadC16O9562.js
         -1.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\templates[2].css
         -1.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\load6AHAERNG.js
         -0.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PGmIi7JRPG4vvRc-zWbPZd0kxAEXHadva_wnuyT7QB4S3L9M6LX.js
         -0.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\marker[2].css
         -0.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\style[5].css
         -0.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PGmIi7JRPG4vvRc-zWbPZd0kxAEXHadva_wnuyT7QB4J16DM076.js
         -0.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\widgetsI479Z999.js
         -0.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PGmIi7JRPG4vvRc-zWbPZd0kxAEXHadva_wnuyT7QB4DGDX59P2.js
         -0.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\pinitIU2UURQU.js
          0.0s C:\Users\xanthin1\Desktop\FRST64.exe
          0.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\fontawesome-webfontSTXL0U28.eot
          0.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\wpcomments[2].css
          0.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\s-BiyweUPV0v-yRb-cjciFQlYEbsez9cZjKsNMjLOwMTLL85O6A.eot
          0.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\mqvGe0REcQNb_tfYSePALA3VCCHT7Z.eot
          0.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\fbseo-style[2].css
          1.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jqueryZR51XZHO.js
          1.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\allC91YUBV4.js
          5.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\colorbox[2].css
          5.9s C:\Windows\System32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{697ba2b0-4b77-4058-85e8-89d46a6f32f2}\
          5.9s C:\Windows\System32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{697ba2b0-4b77-4058-85e8-89d46a6f32f2}\snapshot.etl
          6.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VI_videos,videoadpage,spryliving[5].htm
          6.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\reload7DCZ3J67.js
          8.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Zd2E9abXLFGSr9G3YK2MsMd-vqFyeuiaDIrtTqsKQLw1D9UVZAB.eot
          8.8s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{149D6167-C7C0-47E7-9495-C0C203DB1C33}
         10.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\xRppWELPO9mGIONBARvbXgWTOG0O1B.eot
         10.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SenseHandler[7].js
         11.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\audiences[8].js
         11.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FiveminCookieCacheKBDT5H6J.js
         22.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ssl2[3].htm
         22.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.carouFredSel-6.2.1-packed[2].js
         22.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\pshandler[2].js
         22.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VI_videos,videoadpage,spryliving[6].htm
         22.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\222[8].json
         22.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.ba-throttle-debounce.min[2].js
         22.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ws-0E1B7608[3].js
         22.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\w[3].js
         22.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ggv2[4].js
         23.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_static[6].js
         23.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\plusoneT3TK78CY.js
         23.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gprofiles[6].js
         24.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5gWwNxgds7YXZCRqZwhDGg[3].eot
         25.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\216PQWFMHVA.json
         25.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\era_rlP2WI0G9B.js
         26.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\mqvGe0REcQNb_tfYSePALA1Y72EPX6.eot
         26.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\212SOMZSKK5.json
         26.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\video[7].htm
         26.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.mousewheel.min[2].js
         26.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\pinit_mainB4L4FTAX.js
         26.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.transit.min[2].js
         26.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\wpgroho[6].js
         27.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.touchSwipe.min[2].js
         38.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CREReqScript[1].js
         38.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FiveminCookieCacheEBB4DRST.js
         39.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\app_kitchensink.min[4].js
         39.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagPC0DGKM1.js
         40.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Zd2E9abXLFGSr9G3YK2MsMd-vqFyeuiaDIrtTqsKQLw9ED8CKMD.eot
         40.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\reloadZSM5QKTB.js
         40.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DOHAK8DimZJeSQQDpH-4yw[4].eot
         41.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2501VB5N705.json
         41.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\xRppWELPO9mGIONBARvbXgCA8ESBLB.eot
         41.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\214XR4LIJAR.json
         41.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.fancybox[2].js
         42.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\showadDGI9E6WK.htm
         42.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagPJRGXOC7.js
         42.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\reloadS2PJBKTQ.js
         42.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\cb=gapi2VKVU142.js
         42.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\cb=gapi2VKVU142.js
         42.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\comment-reply.min[3].js
         49.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\aBQVVQvnHeKhkWtMdHDrBAQYG9CYCX.eot
         52.3s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{3A496AD7-F95A-4DC5-9EBA-A3C2A3FE530D}
         53.0s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2158Q6FSNJB.json
         53.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajs7Q2IOEZI.js
         54.6s C:\Windows\Prefetch\FRST.EXE-75A69D4E.pf
         55.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\scripts[6].js
         62.0s C:\$Recycle.Bin\S-1-5-21-3338560104-2605595989-2742162462-1001\$IX953SF.exe
         65.1s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\MetaStore\2\93\0122E5A982847B05.dat
         65.1s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\MetaStore\2\93\
         65.1s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\MetaStore\2\93\
         65.3s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{111DCCF1-212D-45A9-BAB2-3273AF1EFBBD}
         70.4s C:\FRST\Hives\
         70.4s C:\FRST\Logs\
         70.4s C:\FRST\
         70.4s C:\FRST\Quarantine\
         71.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ticker[3].js
         71.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ticker[3].js
         71.3s C:\FRST\Hives\ERDNT.INF
         71.3s C:\FRST\Hives\ERDNT.CON
         71.3s C:\FRST\Hives\SOFTWARE
         71.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajsC53H5HW4.js
         71.8s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{20E48BA7-10C4-4B4D-BE8E-6703BB3EC926}
         71.8s C:\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{20E48BA7-10C4-4B4D-BE8E-6703BB3EC926}
         71.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagPOM5ADK9.js
         72.0s C:\FRST\Hives\SYSTEM
         72.1s C:\FRST\Hives\DEFAULT
         72.1s C:\FRST\Hives\SECURITY
         72.1s C:\FRST\Hives\SAM
         72.1s C:\FRST\Hives\Users\
         72.1s C:\FRST\Hives\Users\00000001\
         72.1s C:\FRST\Hives\Users\00000001\NTUSER.DAT
         72.1s C:\FRST\Hives\Users\00000001\NTUSER.DAT
         72.1s C:\FRST\Hives\Users\00000002\
         72.1s C:\FRST\Hives\Users\00000002\UsrClass.dat
         72.2s C:\FRST\Hives\COMPONENTS
         72.2s C:\FRST\Hives\COMPONENTS
         72.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagS3PMTE2J.js
         72.7s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\beaconD3FM3MJG.js
         72.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\respond.min[3].js
         73.0s C:\FRST\Hives\ERDNT.EXE
         73.0s C:\FRST\Hives\ERDNT.EXE
         73.1s C:\FRST\Hives\ERDNTWIN.LOC
         73.1s C:\FRST\Hives\ERDNTDOS.LOC
         73.1s C:\Windows\Prefetch\ERUNT.EXE-45966165.pf
         73.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.tweet[2].js
         73.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.tweet[2].js
         73.5s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tag54S8T5H9.js
         74.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\adfOLGY7HEU.js
         74.8s C:\Windows\Prefetch\FRST64.EXE-72F01750.pf
         75.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\retina[3].js
         75.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\retina[3].js
         75.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2135OEHX5JT.json
         77.4s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\history.adapter.jquery[2].js
         77.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         77.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         77.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         77.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\764[8].json
         78.1s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\history[2].js
         79.6s C:\Users\xanthin1\Desktop\FRST.txt
         81.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\226[6].json
         81.6s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagDH4X7FZV.js
         85.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajs0V6G3GD1.js
         87.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tps-transition-slide[2].js
         88.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\224[8].json
         88.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\gallery[2].js
         88.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\225AK0K36ZY.json
         88.8s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\colorbox[2].js
         88.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\adfJ4IVNYH3.js
         89.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ajsORU56HLT.js
         89.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.carouFredSel-6.2.1[2].js
         89.2s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\jquery.elastislide[2].js
         89.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\225SPEX7X86.json
         89.3s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\tagT6QKCV3K.js
         109.9s C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\253[8].json
         115.3s C:\Users\xanthin1\Desktop\Addition.txt
         120.3s C:\Windows\Prefetch\MOD_FRST.EXE-D328E2AD.pf
         134.5s C:\FRST\Logs\Addition.txt
         134.5s C:\Windows\Prefetch\WEVTUTIL.EXE-1E154F39.pf
         134.6s C:\FRST\Logs\FRST_30-06-2014_09-20-47.txt

Cookies _____________________________________________________________________
   C:\Users\xanthin1\AppData\Roaming\Microsoft\Windows\Cookies\FSXKJUQC.txt

 

results from eset scan

C:\FRST\Quarantine\C\Windows\system32\rpcss.dll.xBAD Win64/Patched.I trojan
C:\Program Files (x86)\Dell DataSafe Local Backup\hstart.exe a variant of Win32/HiddenStart.A potentially unsafe application
C:\Program Files (x86)\Dell DataSafe Local Backup\Components\DSUpdate\hstart.exe a variant of Win32/HiddenStart.A potentially unsafe application

 

 Results of screen317's Security Check version 0.99.85 
 Windows 7 Service Pack 1 x64 (UAC is enabled) 
 Internet Explorer 11 
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled! 
Microsoft Security Essentials  
 Antivirus up to date! 
`````````Anti-malware/Other Utilities Check:`````````
 Adobe Reader 10.1.10 Adobe Reader out of Date! 
````````Process Check: objlist.exe by Laurent```````` 
 Microsoft Security Essentials MSMpEng.exe
 Microsoft Security Essentials msseces.exe
 Malwarebytes Anti-Malware mbamservice.exe 
 Malwarebytes Anti-Malware mbam.exe 
 Malwarebytes Anti-Malware mbamscheduler.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 0%
````````````````````End of Log``````````````````````

 

 

 

thank you,

 

Sabrina
 



#8 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:10:37 AM

Posted 01 July 2014 - 02:16 PM

Hello Sabrina,

 

Your logs are clean.

 

You need to update Adobe Reader to the latest version.
Older versions may have vulnerabilities that malware can use to infect your system.
Please download and install Adobe Reader 11.0.07.

 

 

  • It is possible for other programs on your computer to have security vulnerability that can allow malware to infect you.  
  • Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities.
  • You can check these by visiting Secunia Software Inspector or you can use the following application for this purpose PatchMyPC

 

 

Visit Microsoft's Windows Update Site Frequently

 

  • It is important that you visit Windows Update regularly.
  • This will ensure your computer has always the latest security updates available installed on your computer.  
  • If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

 

 

I guess I can post my final recommendations to you now:


Nicely done ! :bananas: This is the end of our journey if you don't have any more questions.
Thank you for following my instructions perfectly. smile.png
I have some final words for you.
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.


 
STEP 1 CLEANUP
 

 
To remove all of the tools we used and the files and folders they created, please do the following:

 
Download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST/FRST64 and press the Fix button just once and wait.
It's no needed to post the log this time.

 

 

  • Next please download Delfix.exe by Xplode and save it to your desktop.
  • Please start it and check the box next to "Remove disinfection tools" and click on the run button.
  • The tool will delete itself once it finishes.

Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.


 
STEP 2 SECURITY ADVICES


Change all your passwords !


Since your computer was infected for peace of mind, I would however advise you that all your passwords be changed immediately including those for bank accounts, credit cards and home loans, PIN codes etc)!! (just in case).
If you're storing password in the browser to access websites than they are non encrypted well (only if you use Firefox with master password protection activated provide better security). So I strongly recommend to change as much password as possible. Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.
Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use Password Generator - Norton Identity Safe to create random passwords and then install an application like KeePass Password Safe to store them for easy access.If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft
 

 

Keep your antivirus software turned on and up-to-date

  • Make sure your antivirus software is turned on and up-to-date.
  • New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
    Note:
  • You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
  • You should scan your computer with an AntiSpyware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
  • Be sure to check for and download any definition updates prior to performing a scan.
  • Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.

 

 

Install HIPS based software if needed (or use Limited Account with UAC enabled)

 
I usually recommend to users to install HIPS based software but this type software is only effective in the right hands since it require from the users to take the right decisions.
 
HIPS based software controls what an application is allowed to do and not allowed to do.
It monitors what each application tries to do, how it use the internet and give you the ability to block any suspicious activity occurring on your computer.
In my opinion the best way to prevent an unknown malware from gaining access is to use some HIPS programs (like COMODO Firewall, PrivateFirewall, Online Armor etc.) to control the access rights of legitimate applications, although this would only be advisable for experienced users. (so if you don't feel comfortable using such software then you can skip this advice)
 
However, you should be aware though that (if you install Comodo Firewall and not the whole package Comodo Internet Security) this is not an replacement for a standard antivirus application. It's a great tool to add another layer of protection to your existent antivirus application. Also note that if you have an antivirus installed then you should install Comodo Firewall (and not Comodo Internet Security to avoid conflicts).
 
It takes some time and knowledge to configure it for individual purposes but once done, you should not have a problems with it.
There are so many reviews on YouTube and blogs about all these programs.
Keep in mind to choose carefully in order to avoid conflicts or instability caused by incompatible security programs.
Also having more than one "real-time" program can be a drain on your PC's efficiency so please refrain doing so.
More information about HIPS can be found here: What is Host Intrusion Prevention System (HIPS) and how does it work?
 
If you like Comodo you should choose for yourself which version of Comodo you will use 5 or 7. Personally I stick to version 5 at least for now.

 

By the way Microsoft Security Essentials is not that good... Check this out => Kaspersky Internet Security 2014 Crowned the Best Anti-Virus in the World After New Tests. I would recommend you to replace it with avast!9 free or Comodo Internet Security or Qihoo 360 Internet Security. If you like MSE and you don't want to replace it then you should consider adding an addition layer of protection like Comodo Firewall.
 

 

If these kind of programs are difficult for you to use then you can use a standard user account with UAC enabled. If you need administrative privileges to perform some tasks, then you can use Run As or log on as the administrator account for that specific task.

 

 

Be prepared for CryptoLocker:


CryptoLocker Ransomware Information Guide and FAQ
Cryptolocker Ransomware: What You Need To Know
New CryptoLocker Ransomware Variant Spread Through Yahoo Messenger
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
CryptoWall - A new ransomware from the creators of CryptoDefense


Since the prevention is better than cure you can use gpedit built-in Windows or CryptoPrevent (described in the first link) to secure the PC against this locker.
Another way is to use Comodo Firewall and to add all local disks to Protected Files and Folders
You may want to check HitmanPro.Alert.CryptoGuard and add install it to be safe when surfing the net.

Also MBAM acquired the following software Malwarebytes Anti-Exploit and it should work with the most popular browsers. Beware the product is in beta stage.
Changelog can be seen here and known issues here.

(Keep in mind that HitmanPro.Alert is not fully compatible with Malwarebytes' Anti-Exploit and you should choose only one between both of them).

 

EMET and VoodooShield are another great tools which should lock the computer against exploits but they are too confusing to use for home users. However you can take a look at them if you want.
 
I would not install them all because they could render your pc unusable and will slow it down like a turtle.
Having more than one "real-time" program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.

 

Practice Safe Internet


One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.  Below are a list of simple precautions to take to keep your computer clean and running securely:

  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that.  Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • .exe, .com, .bat, .pif, .scr, .cmd or .vbs do not open the attachment unless you know for a fact that it is clean.  For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is.  The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
    Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams.  For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message  or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.  We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window.  If there is a menu that comes up saying Add to Favorites... you know it's a fake.
  • Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
  • Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.

 

 

Tweak your browsers
 
 
MOZILLA FIREFOX


To prevent further infections be sure to install the following add-ons NoScript and AdBlock Plus
 

Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.

 

Adblock Plus can be found here.
 
Do not add to many filters subscriptions because it will slow down your browser startup time.
 
erfxUim.jpg
 

NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.

 
NoScript can be found here
 
You can find the optimal settings here
A tutorial on how to use it can be found here


 
Google Chrome

 
If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.

However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access

 
 
For Internet Explorer 9/10 read the articles below:


Security and privacy features in Internet Explorer 9
Enhanced Protected Mode
Use Tracking Protection in Internet Explorer
Security in Internet Explorer 10

 

 
 
Immunize your browsers with SpywareBlaster 5 and Spybot Search and Destroy 1.6


 
Make the extensions for known file types visible:
 
 
Be wary of files with a double extension such as jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.


 
Disable Autorun and Windows Scripting Host:
 
 
It's a good idea to disable the Autorun functionality using the following tool to prevent spreading of the infections from USB flash drives.

 

If you don't use any script files then you can go ahead and disable Windows Scripting Host using the tool provided by Symantec - NoScript.exe. Simple download and run it and click on the Disable button and reboot the computer. If you need to run any js. or vbs scripts at a later stage you should run NoScript again and select Enable, then reboot the computer.
 

 
Create an image of your system (you can use the built-in Windows software as well if you prefer)

  • Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
  • Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
  • The download link is here.
  • The tutorial on how to create an system image can be found here.
  • The tutorial on how to restore an system image can be found here.
  • Be sure to read the tutorial first.

 

 

Follow this list and your potential for being infected again will reduce dramatically.

 

Safe Surfing ! :)
 
 
Cheers,
Georgi


cXfZ4wS.png


#9 xanthin1

xanthin1
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:37 AM

Posted 03 July 2014 - 04:55 PM

Thank you so much for all your help!  I wanted to give it a couple of days to really make sure it was clean, but everything is running great!  Thanks again!

 

Sabrina



#10 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:10:37 AM

Posted 04 July 2014 - 12:53 AM

Hi Sabrina,

 

Wise decision. :)

You're more than welcome and I am glad I could help!

Take care and have a nice weekend!

 

 

Regards,

Georgi


cXfZ4wS.png


#11 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:10:37 AM

Posted 04 July 2014 - 12:54 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

cXfZ4wS.png





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users