Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

dlllhost.exe*32 overload in processes


  • Please log in to reply
23 replies to this topic

#1 Fell

Fell

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 26 August 2014 - 07:54 AM

Hello:

 

I am having a similiar problem to the person of this post:

 

http://www.bleepingcomputer.com/forums/t/514186/30-dllhostexe32-com-surrogate-processes-are-running/

 

I am getting kicked out of applications and when I look at the task list I have an insane number of dlllhost.exe running in the background and my CPU usage is topping at 100% constantly.

 

I have not taken any steps at this point to solve the issue; I was only exploring my issue and would like some help.

 

Thank you for your time.

 

 



BC AdBot (Login to Remove)

 


#2 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 26 August 2014 - 07:58 AM

Hi Fell,
 
Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.
 
rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.

After the tool has finished running, a text file named Rkill.txt should be located on the desktop. Please copy and paste the contents into your next reply.
xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#3 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 26 August 2014 - 04:44 PM

Rkill 2.6.8 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 08/26/2014 04:37:39 PM in x64 mode.
Windows Version: Windows 7 Home Premium Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 2648) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 9308) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 12540) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 3400) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 14112) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 15264) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 16880) [UP-HEUR]
 * C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe (PID: 14540) [UP-HEUR]

8 proccesses terminated!

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * System Restore Disabled

   [HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore]
   "DisableConfig" = dword:00000001

 * System Restore Disabled

   [HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore]
   "DisableSR" = dword:00000001

Checking Windows Service Integrity:

 * Windows Firewall Authorization Driver (mpsdrv) is not Running.
   Startup Type set to: Manual

 * BFE [Missing Service]
 * BITS [Missing Service]
 * iphlpsvc [Missing Service]
 * MpsSvc [Missing Service]
 * WinDefend [Missing Service]
 * wscsvc [Missing Service]
 * wuauserv [Missing Service]

 * SharedAccess [Missing ImagePath]

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * No issues found.

Program finished at: 08/26/2014 04:41:52 PM
Execution time: 0 hours(s), 4 minute(s), and 13 seconds(s)
 



#4 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 27 August 2014 - 06:36 AM

Hi Fell,
 
Please download Farbar Recovery Scan Tool and save it to your Desktop.
 
Note: You need to run the version compatible with your system. If you are not sure which version applies to your system, download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Right-click FRST then click "Run as administrator" (XP users: click run after receipt of Windows Security Warning - Open File).
  • When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • When finished, it will produce a log called FRST.txt in the same directory the tool was run from.
  • Please copy and paste the log in your next reply.

Note 2: The first time the tool is run it generates another log (Addition.txt - also located in the same directory the tool was run from). Please also paste that, along with the FRST.txt into your next reply.
xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#5 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 27 August 2014 - 07:43 AM

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 25-08-2014
Ran by Dan (administrator) on SUPERNEWT on 27-08-2014 07:05:57
Running from C:\Users\Dan\Downloads
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: English (United States)
Internet Explorer Version 9
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
() C:\Program Files (x86)\ASUS\EPU-4 Engine\FourEngine.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Microsoft Corporation) C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe
(Microsoft Corporation) C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Devices Agent\AgentSvc.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAService.exe
(Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Security Protection\PSANHost.exe
(Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
() C:\Program Files\LTONHIS\Touch Manager\SKDaemon.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Microsoft Corporation) C:\Program Files\Microsoft Xbox 360 Accessories\XBoxStat.exe
(Microsoft Corporation) C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
() C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
(Broadcom Corporation.) C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
(Applian Technologies, Inc.) C:\Program Files (x86)\Freecorder\FLVSrvc.exe
(Sun Microsystems, Inc.) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(Apple Inc.) C:\Program Files (x86)\iTunes\iTunesHelper.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAMain.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Microsoft Corporation) C:\Windows\SysWOW64\svchost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
(Microsoft Corporation) C:\Windows\System32\cmd.exe
(Microsoft Corporation) C:\Windows\SysWOW64\cmd.exe
(Microsoft Corporation) C:\Windows\System32\consent.exe
(RealNetworks, Inc.) C:\Program Files (x86)\Real\RealPlayer\Update\realsched.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe
(Microsoft Corporation) C:\Windows\SysWOW64\dllhost.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [SKDaemon.exe] => C:\Program Files\LTONHIS\Touch Manager\SKDaemon.exe [318464 2009-06-16] ()
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [7833120 2009-05-22] (Realtek Semiconductor)
HKLM\...\Run: [Skytel] => C:\Program Files\Realtek\Audio\HDA\Skytel.exe [1833504 2009-05-22] (Realtek Semiconductor Corp.)
HKLM\...\Run: [XboxStat] => C:\Program Files\Microsoft Xbox 360 Accessories\XboxStat.exe [825184 2009-09-30] (Microsoft Corporation)
HKLM-x32\...\Run: [Freecorder FLV Service] => C:\Program Files (x86)\Freecorder\FLVSrvc.exe [167936 2010-06-26] (Applian Technologies, Inc.)
HKLM-x32\...\Run: [Microsoft Default Manager] => C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe [439568 2010-05-10] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] => C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [43816 2014-07-31] (Apple Inc.)
HKLM-x32\...\Run: [TkBellExe] => c:\program files (x86)\real\realplayer\Update\realsched.exe [296056 2012-05-29] (RealNetworks, Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [252848 2012-07-03] (Sun Microsystems, Inc.)
HKLM-x32\...\Run: [QuickTime Task] => C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2014-01-17] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] => C:\Program Files (x86)\iTunes\iTunesHelper.exe [152392 2014-08-01] (Apple Inc.)
HKLM-x32\...\Run: [PSUAMain] => C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAMain.exe [37624 2014-07-24] (Panda Security, S.L.)
HKLM-x32\...\RunOnce: [AvgUninstallURL] => cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-app?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA"&"inst=NwA3AC0ANAAyADIAMwAwADMANAA0ADQALQBGAFAAOQArADYALQBCAEEAUgA5AEcAKwAxAC0AVABCADkAKwAyAC0ARgBMACsAOQAtAFgATwAzADYAKwAxAC0ARgA5AE0ANwBDACsANQAtAEYAOQBNADEAMABCACsAMgAtAFgATwA5ACsAMQAtAEYAOQBNADIAKwAxAC0ARABEAFQAKwAxADgAOQA0ADkALQBEAEQAOQAwAEYAKwAxAC0AUwBUADkAMABGAEEAUABQACsAMQAtAEYAOQAwAE0AMQAyAEEATgArADEALQBGADkAMABNADEAMgBBACsAMQAtAEYAOQAwAE0AMQAyAEEAQgArADEALQBGADkAMABNADEAMgBBAFQAQgBOACsAMQAtAEYAOQAwAE0AMQAyAEIAKwAxAC0AVABCAFYAVQBQAEcAKwAxADIALQBGADkAMABNADEAMgBGAE4AKwAxAC0AVABCAE4AKwAxAC0ARgA5ADAATQAxADIAVABBACsAMQAtAEYAOQAwAE0AMQAyAFIAKwAxADIALQBWAEkAUAAxADIAKwAxAA"&"prod=90"&"ver=9.0.894
HKLM Group Policy restriction on software: C:\Documents and Settings\All Users\Application Data\McAfee <====== ATTENTION
HKLM\...\Winlogon: [Userinit] C:\Windows\SysWOW64\userinit.exe,
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [msnmsgr] => C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe [3872080 2010-04-16] (Microsoft Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Pando Media Booster] => C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe [2938552 2010-04-04] ()
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Steam] => C:\Program Files (x86)\Steam\Steam.exe [1937600 2014-08-13] (Valve Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2011-10-12] (Google Inc.)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Bitberry] => C:\Users\Dan\AppData\Roaming\bssbdgdt\etvuetvw.exe [143872 2010-11-20] ()
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Totayvizdaqoi] => C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe [464896 2014-08-27] (Intel Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...409d6c4515e9\InprocServer32: [Default-shell32]  <==== ATTENTION!
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Bluetooth.lnk
ShortcutTarget: Bluetooth.lnk -> C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe (Broadcom Corporation.)

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://searchfunmoods.com/?f=1&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = http://searchfunmoods.com/?f=1&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
SearchScopes: HKLM - DefaultScope {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B} URL = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=260&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&o=APN10645&apn_uid=2351152231044850&q={searchTerms}
SearchScopes: HKLM - {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B} URL = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
SearchScopes: HKLM-x32 - DefaultScope {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B} URL = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
SearchScopes: HKLM-x32 - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=260&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&o=APN10645&apn_uid=2351152231044850&q={searchTerms}
SearchScopes: HKLM-x32 - {afdbddaa-5d3f-42ee-b79c-185a7020515b} URL = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT1060933
SearchScopes: HKLM-x32 - {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B} URL = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
SearchScopes: HKCU - DefaultScope {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=260&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&o=APN10645&apn_uid=2351152231044850&q={searchTerms}
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKCU - {0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9} URL = http://search.babylon.com/?q={searchTerms}&affID=109935&tt=060612_6_&babsrc=SP_ss&mntrId=4ced4cef000000000000002618e0b15f
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=260&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&o=APN10645&apn_uid=2351152231044850&q={searchTerms}
SearchScopes: HKCU - {afdbddaa-5d3f-42ee-b79c-185a7020515b} URL = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT1060933
SearchScopes: HKCU - {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B} URL = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
BHO: AVG Safe Search -> {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} -> C:\Program Files (x86)\AVG\AVG9\avgssiea.dll No File
BHO: Windows Live Family Safety Browser Helper Class -> {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} -> C:\Program Files\Windows Live\Family Safety\fssbho.dll (Microsoft Corporation)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation)
BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
BHO: Skype Click to Call for Internet Explorer -> {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} -> C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll (Microsoft Corporation)
BHO: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre6\bin\jp2ssv.dll (Sun Microsystems, Inc.)
BHO-x32: No Name -> {02478D38-C3F9-4efb-9B51-7695ECA05670} ->  No File
BHO-x32: AC-Pro -> {0FB6A909-6086-458F-BD92-1F8EE10042A0} -> C:\Program Files (x86)\AutocompletePro\AutocompletePro.dll (SimplyGen)
BHO-x32: RealPlayer Download and Record Plugin for Internet Explorer -> {3049C3E9-B461-4BC5-8870-4C09146192CA} -> C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll (RealPlayer)
BHO-x32: AVG Safe Search -> {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} -> C:\Program Files (x86)\AVG\AVG9\avgssie.dll No File
BHO-x32: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} ->  No File
BHO-x32: Funmoods Helper Object -> {75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} -> C:\Program Files (x86)\Funmoods\1.5.23.22\bh\escort.dll (Funmoods BHO)
BHO-x32: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation)
BHO-x32: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO-x32: Skype Click to Call for Internet Explorer -> {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} -> C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll (Microsoft Corporation)
BHO-x32: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO-x32: Yontoo -> {FD72061E-9FDE-484D-A58A-0BAB4151CAD8} -> C:\Program Files (x86)\Yontoo\YontooIEClient.dll (Yontoo LLC)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKLM-x32 - Funmoods Toolbar - {A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} - C:\Program Files (x86)\Funmoods\1.5.23.22\escorTlbr.dll (Funmoods)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKCU - No Name - {21FA44EF-376D-4D53-9B0F-8A89D3229068} -  No File
Toolbar: HKCU - Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
DPF: HKLM-x32 {A8F2B9BD-A6A0-486A-9744-18920D898429} http://www.sibelius.com/download/software/win/ActiveXPlugin.cab
DPF: HKLM-x32 {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Handler: skypec2c - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll (Microsoft Corporation)
Handler-x32: skypec2c - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll (Microsoft Corporation)
Winsock: Catalog5 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5 09 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
Winsock: Catalog5-x64 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5-x64 09 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1

FireFox:
========
FF ProfilePath: C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default
FF DefaultSearchEngine: Search the web (Babylon)
FF SearchEngineOrder.1: Search the web (Babylon)
FF SelectedSearchEngine: Search the web (Babylon)
FF Homepage: hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f
FF Keyword.URL: hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=KW_ss&mntrId=4ced4cef000000000000002618e0b15f&q=
FF NetworkProxy: "no_proxies_on", "*.local"
FF NetworkProxy: "type", 0
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF64_14_0_0_179.dll ()
FF Plugin: @java.com/JavaPlugin -> C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_14_0_0_179.dll ()
FF Plugin-x32: @Apple.com/iTunes,version=1.0 -> C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll ()
FF Plugin-x32: @java.com/DTPlugin,version=10.17.2 -> C:\Windows\SysWOW64\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.17.2 -> C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/OfficeLive,version=1.5 -> C:\Program Files (x86)\Microsoft\Office Live\npOLW.dll (Microsoft Corp.)
FF Plugin-x32: @microsoft.com/WLPG,version=14.0.8064.0206 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks)
FF Plugin-x32: @real.com/nppl3260;version=15.0.4.53 -> c:\program files (x86)\real\realplayer\Netscape6\nppl3260.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprjplug;version=15.0.4.53 -> c:\program files (x86)\real\realplayer\Netscape6\nprjplug.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprpchromebrowserrecordext;version=15.0.4.53 -> C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprpchromebrowserrecordext.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprphtml5videoshim;version=15.0.4.53 -> C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprpplugin;version=15.0.4.53 -> c:\program files (x86)\real\realplayer\Netscape6\nprpplugin.dll (RealPlayer)
FF Plugin-x32: @tools.google.com/Google Update;version=3 -> C:\Program Files (x86)\Google\Update\1.3.24.15\npGoogleUpdate3.dll (Google Inc.)
FF Plugin-x32: @tools.google.com/Google Update;version=9 -> C:\Program Files (x86)\Google\Update\1.3.24.15\npGoogleUpdate3.dll (Google Inc.)
FF Plugin HKCU: pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks)
FF user.js: detected! => C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\user.js
FF Extension: Yahoo! Toolbar - C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\Extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1} [2014-06-25]
FF Extension: FTdownloader - C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\Extensions\ftdownloader@ftdownloader.com.xpi [2012-11-29]
FF Extension: No Name - C:\Program Files (x86)\Mozilla Firefox\browser\extensions\{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}.xpi [2014-08-24]
FF HKLM-x32\...\Firefox\Extensions: [{3252b9ae-c69a-4eaf-9502-dc9c1f6c009e}] - C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DMExtension
FF Extension: Default Manager - C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DMExtension [2011-01-26]
FF HKLM-x32\...\Firefox\Extensions: [{97E22097-9A2F-45b1-8DAF-36AD648C7EF4}] - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext
FF Extension: RealPlayer Browser Record Plugin - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext [2011-10-28]

Chrome:
=======
CHR HomePage: Default -> hxxp://www.searchnu.com/406
CHR RestoreOnStartup: Default -> "hxxp://www.searchnu.com/406", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f", "hxxp://www.google.com"
CHR NewTab: Default -> "chrome-extension://oocaehgghkpmfmafjenhhnkbfdjjbkic/config/skin/new-tab.html"
CHR DefaultSearchKeyword: Default -> funmoods.com
CHR DefaultSearchProvider: Default -> Funmoods
CHR DefaultSearchURL: Default -> http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
CHR DefaultSuggestURL: Default -> {google:baseSuggestURL}search?client=chrome&hl={language}&q={searchTerms}
CHR Plugin: (Remoting Viewer) - internal-remoting-viewer
CHR Plugin: (Native Client) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\ppGoogleNaClPluginChrome.dll No File
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\pdf.dll No File
CHR Plugin: (Shockwave Flash) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\gcswf32.dll No File
CHR Plugin: (Shockwave Flash) - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_3_300_257.dll No File
CHR Plugin: (Adobe Acrobat) - C:\Program Files (x86)\Adobe\Reader 8.0\Reader\Browser\nppdf32.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin2.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin3.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin4.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin5.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll No File
CHR Plugin: (Google Update) - C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll No File
CHR Plugin: (Silverlight Plug-In) - C:\Program Files (x86)\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation)
CHR Plugin: (Microsoft Office Live Plug-in for Firefox) - C:\Program Files (x86)\Microsoft\Office Live\npOLW.dll (Microsoft Corp.)
CHR Plugin: (Java Deployment Toolkit 7.0.50.255) - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
CHR Plugin: (Java™ Platform SE 7 U5) - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\plugin2\npjp2.dll (Oracle Corporation)
CHR Plugin: (Pando Web Plugin) - C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks)
CHR Plugin: (Windows Live® Photo Gallery) - C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
CHR Plugin: (iTunes Application Detector) - C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll ()
CHR Plugin: (RealNetworks™ Chrome Background Extension Plug-In (32-bit) ) - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprpchromebrowserrecordext.dll (RealNetworks, Inc.)
CHR Plugin: (RealPlayer™ HTML5VideoShim Plug-In (32-bit) ) - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll (RealNetworks, Inc.)
CHR Plugin: (RealPlayer™ G2 LiveConnect-Enabled Plug-In (32-bit) ) - c:\program files (x86)\real\realplayer\Netscape6\nppl3260.dll (RealNetworks, Inc.)
CHR Plugin: (RealPlayer Download Plugin) - c:\program files (x86)\real\realplayer\Netscape6\nprpplugin.dll (RealPlayer)
CHR Plugin: (RealJukebox NS Plugin) - c:\program files (x86)\real\realplayer\Netscape6\nprjplug.dll (RealNetworks, Inc.)
CHR Profile: C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Funmoods) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh [2002-01-01]
CHR Extension: (YouTube) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2012-06-17]
CHR Extension: (Google Search) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2012-06-17]
CHR Extension: (AutocompletePro plugin for chrome) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk [2012-06-17]
CHR Extension: (FTdownloader) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli [2002-01-01]
CHR Extension: (RealPlayer HTML5Video Downloader Extension) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfmjfhklogoienhpfnppmbcbjfjnkonk [2012-06-17]
CHR Extension: (Yontoo) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc [2002-01-01]
CHR Extension: (Gmail) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2012-06-17]
CHR HKLM\...\Chrome\Extension: [bbjciahceamgodcoidkjpchnokgfpphh] - C:\Users\Dan\AppData\Local\funmoods.crx [2012-12-16]
CHR HKCU\...\Chrome\Extension: [bbjciahceamgodcoidkjpchnokgfpphh] - C:\Users\Dan\AppData\Local\funmoods.crx [2012-12-16]
CHR HKLM-x32\...\Chrome\Extension: [bbjciahceamgodcoidkjpchnokgfpphh] - C:\Users\Dan\AppData\Local\funmoods.crx [2012-12-16]
CHR HKLM-x32\...\Chrome\Extension: [defdhglnppeioeflggkmglipcecffkhk] - C:\Program Files (x86)\AutocompletePro\chrome\autocompleteprochrome.crx [2010-07-23]
CHR HKLM-x32\...\Chrome\Extension: [gkjoindjjcmbdpbfppabdgflnkgbbcli] - C:\Program Files (x86)\FTDownloader.com\FTDownloader10.crx [2012-11-29]
CHR HKLM-x32\...\Chrome\Extension: [jfmjfhklogoienhpfnppmbcbjfjnkonk] - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Chrome\Ext\rphtml5video.crx [2011-10-28]
CHR HKLM-x32\...\Chrome\Extension: [lifbcibllhkdhoafpjfnlhfpfgnpldfl] - C:\Program Files (x86)\Skype\Toolbars\ChromeExtension\skype_chrome_extension.crx [2014-07-14]
CHR HKLM-x32\...\Chrome\Extension: [niapdbllcanepiiimjjndipklodoedlc] - C:\Program Files (x86)\Yontoo\YontooLayers.crx [2012-12-16]

==================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 c2cautoupdatesvc; C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe [1390176 2014-07-14] (Microsoft Corporation)
R2 c2cpnrsvc; C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe [1767520 2014-07-14] (Microsoft Corporation)
R2 NanoServiceMain; C:\Program Files (x86)\Panda Security\Panda Security Protection\PSANHost.exe [141560 2014-07-24] (Panda Security, S.L.)
R2 PandaAgent; C:\Program Files (x86)\Panda Security\Panda Devices Agent\AgentSvc.exe [61688 2014-07-23] (Panda Security, S.L.)
R2 PSUAService; C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAService.exe [38136 2014-07-24] (Panda Security, S.L.)

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 ASInsHelp; C:\Windows\SysWow64\drivers\AsInsHelp64.sys [11832 2008-01-04] ()
R1 AsIO; C:\Windows\SysWow64\drivers\AsIO.sys [13440 2009-08-03] ()
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [15416 2009-07-15] ()
R1 NNSALPC; C:\Windows\System32\DRIVERS\NNSAlpc.sys [96800 2014-06-04] (Panda Security, S.L.)
R1 NNSHTTP; C:\Windows\System32\DRIVERS\NNSHttp.sys [162336 2014-06-18] (Panda Security, S.L.)
R1 NNSHTTPS; C:\Windows\System32\DRIVERS\NNSHttps.sys [112160 2014-06-04] (Panda Security, S.L.)
R1 NNSIDS; C:\Windows\System32\DRIVERS\NNSIds.sys [115232 2014-06-04] (Panda Security, S.L.)
R1 NNSNAHSL; C:\Windows\System32\DRIVERS\NNSNAHSL.sys [46336 2014-01-16] (Panda Security, S.L.)
R1 NNSPICC; C:\Windows\System32\DRIVERS\NNSPicc.sys [95776 2014-06-04] (Panda Security, S.L.)
R1 NNSPIHSW; C:\Windows\System32\DRIVERS\NNSPihsw.sys [70176 2014-06-04] (Panda Security, S.L.)
R1 NNSPOP3; C:\Windows\System32\DRIVERS\NNSPop3.sys [125984 2014-06-04] (Panda Security, S.L.)
R1 NNSPROT; C:\Windows\System32\DRIVERS\NNSProt.sys [306720 2014-06-04] (Panda Security, S.L.)
R1 NNSPRV; C:\Windows\System32\DRIVERS\NNSPrv.sys [169504 2014-06-04] (Panda Security, S.L.)
R1 NNSSMTP; C:\Windows\System32\DRIVERS\NNSSmtp.sys [115744 2014-06-04] (Panda Security, S.L.)
R1 NNSSTRM; C:\Windows\System32\DRIVERS\NNSStrm.sys [261152 2014-06-04] (Panda Security, S.L.)
R1 NNSTLSC; C:\Windows\System32\DRIVERS\NNSTlsc.sys [109088 2014-06-04] (Panda Security, S.L.)
S0 PsBoot; C:\Windows\System32\Drivers\PsBoot.sys [40480 2014-03-11] (Panda Security, S.L.)
R2 PSINAflt; C:\Windows\System32\DRIVERS\PSINAflt.sys [160800 2014-07-24] (Panda Security, S.L.)
R2 PSINFile; C:\Windows\System32\DRIVERS\PSINFile.sys [120352 2014-07-24] (Panda Security, S.L.)
R1 PSINKNC; C:\Windows\System32\DRIVERS\psinknc.sys [195616 2014-07-24] (Panda Security, S.L.)
R2 PSINProc; C:\Windows\System32\DRIVERS\PSINProc.sys [122400 2014-07-24] (Panda Security, S.L.)
R2 PSINProt; C:\Windows\System32\DRIVERS\PSINProt.sys [132128 2014-07-24] (Panda Security, S.L.)
R2 PSINReg; C:\Windows\System32\DRIVERS\PSINReg.sys [106016 2014-07-24] (Panda Security, S.L.)
R3 PSKMAD; C:\Windows\System32\DRIVERS\PSKMAD.sys [60400 2014-03-25] (Panda Security, S.L.)
R1 Serial; C:\Windows\System32\DRIVERS\serial.sys [94208 2009-07-13] (Brother Industries Ltd.)
U3 TrueSight; C:\Windows\SysWOW64\drivers\TrueSight.sys [33512 2014-08-25] ()

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)


==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-08-27 07:05 - 2014-08-27 07:06 - 00032186 _____ () C:\Users\Dan\Downloads\FRST.txt
2014-08-27 07:03 - 2014-08-27 07:06 - 00000000 ____D () C:\FRST
2014-08-27 07:00 - 2014-08-27 07:00 - 02103296 _____ (Farbar) C:\Users\Dan\Downloads\FRST64.exe
2014-08-27 06:52 - 2014-03-11 10:48 - 00040480 _____ (Panda Security, S.L.) C:\Windows\system32\Drivers\PsBoot.sys
2014-08-27 01:26 - 2014-08-27 01:26 - 00000000 ___HD () C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}
2014-08-26 16:37 - 2014-08-26 16:41 - 00004320 _____ () C:\Users\Dan\Desktop\Rkill.txt
2014-08-26 16:36 - 2014-08-26 16:36 - 01944824 _____ (Bleeping Computer, LLC) C:\Users\Dan\Downloads\rkill.exe
2014-08-26 13:47 - 2014-08-27 06:40 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Coicbey
2014-08-25 19:02 - 2014-08-25 19:02 - 00000000 ____D () C:\_OTL
2014-08-25 18:57 - 2014-08-25 18:57 - 00602112 _____ (OldTimer Tools) C:\Users\Dan\Downloads\OTL.exe
2014-08-25 18:14 - 2014-08-27 03:50 - 00000000 ____D () C:\Users\Dan\AppData\Local\CrashDumps
2014-08-25 17:25 - 2014-08-25 17:25 - 00033512 _____ () C:\Windows\SysWOW64\Drivers\TrueSight.sys
2014-08-25 17:25 - 2014-08-25 17:25 - 00000000 ____D () C:\ProgramData\RogueKiller
2014-08-25 17:24 - 2014-08-25 17:24 - 04851288 _____ () C:\Users\Dan\Downloads\RogueKiller.exe
2014-08-25 16:10 - 2014-08-26 13:42 - 00000000 ____D () C:\ProgramData\Windows Genuine Advantage
2014-08-25 08:32 - 2014-08-25 08:32 - 01329328 _____ () C:\Users\Dan\Downloads\PANDAFREEAV(1).exe
2014-08-25 08:28 - 2014-08-25 08:28 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Panda Security
2014-08-25 08:28 - 2014-03-25 08:15 - 00060400 _____ (Panda Security, S.L.) C:\Windows\system32\Drivers\PSKMAD.sys
2014-08-25 08:27 - 2014-08-25 08:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Panda Free Antivirus
2014-08-25 08:26 - 2014-08-25 08:28 - 00000000 ____D () C:\Program Files (x86)\Panda Security
2014-08-25 08:23 - 2014-08-25 08:28 - 00000000 ____D () C:\ProgramData\Panda Security
2014-08-25 08:23 - 2014-08-25 08:23 - 01329312 _____ () C:\Users\Dan\Downloads\PANDAFREEAV.exe
2014-08-25 03:26 - 2014-08-25 08:09 - 00001945 _____ () C:\Windows\epplauncher.mif
2014-08-25 03:20 - 2014-08-25 03:21 - 13829304 _____ (Microsoft Corporation) C:\Users\Dan\Downloads\mseinstall.exe
2014-08-25 03:00 - 2014-08-25 08:12 - 00000000 ____D () C:\ProgramData\BoostSoftware
2014-08-25 02:59 - 2014-08-25 02:59 - 02958144 _____ (BoostSoftware Inc. ) C:\Users\Dan\Downloads\PCHealthBoost-Setup.exe
2014-08-24 12:59 - 2014-08-24 13:00 - 00000000 ____D () C:\Users\Dan\AppData\Local\Adobe
2014-08-24 12:53 - 2014-08-24 12:54 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-08-14 00:52 - 2014-08-14 00:52 - 00001787 _____ () C:\Users\Public\Desktop\iTunes.lnk
2014-08-14 00:52 - 2014-08-14 00:52 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iPod
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files (x86)\iTunes

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-08-27 07:18 - 2010-07-23 14:51 - 00000000 ____D () C:\Users\Dan\AppData\Local\FLVService
2014-08-27 07:18 - 2010-04-04 21:55 - 00000000 ____D () C:\Users\Dan\AppData\Local\PMB Files
2014-08-27 07:06 - 2014-08-27 07:05 - 00032186 _____ () C:\Users\Dan\Downloads\FRST.txt
2014-08-27 07:06 - 2014-08-27 07:03 - 00000000 ____D () C:\FRST
2014-08-27 07:00 - 2014-08-27 07:00 - 02103296 _____ (Farbar) C:\Users\Dan\Downloads\FRST64.exe
2014-08-27 06:48 - 2011-10-12 00:09 - 00000892 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-08-27 06:40 - 2014-08-26 13:47 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Coicbey
2014-08-27 06:19 - 2012-06-14 10:30 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-08-27 03:50 - 2014-08-25 18:14 - 00000000 ____D () C:\Users\Dan\AppData\Local\CrashDumps
2014-08-27 01:26 - 2014-08-27 01:26 - 00000000 ___HD () C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}
2014-08-26 16:41 - 2014-08-26 16:37 - 00004320 _____ () C:\Users\Dan\Desktop\Rkill.txt
2014-08-26 16:36 - 2014-08-26 16:36 - 01944824 _____ (Bleeping Computer, LLC) C:\Users\Dan\Downloads\rkill.exe
2014-08-26 13:42 - 2014-08-25 16:10 - 00000000 ____D () C:\ProgramData\Windows Genuine Advantage
2014-08-26 11:48 - 2011-10-12 00:09 - 00000888 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-08-25 22:56 - 2012-03-19 00:22 - 00000024 _____ () C:\Users\Dan\Desktop\Yahtzee.dat
2014-08-25 19:56 - 2012-03-19 00:40 - 00000154 _____ () C:\Users\Dan\Desktop\hi.dat
2014-08-25 19:13 - 2009-07-13 23:45 - 00009920 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-08-25 19:13 - 2009-07-13 23:45 - 00009920 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-08-25 19:09 - 2012-06-19 23:04 - 00000000 ____D () C:\Program Files (x86)\Steam
2014-08-25 19:07 - 2009-11-01 11:06 - 00000000 ____D () C:\Users\Dan\Tracing
2014-08-25 19:06 - 2009-07-14 00:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-08-25 19:06 - 2009-07-13 23:51 - 00089439 _____ () C:\Windows\setupact.log
2014-08-25 19:02 - 2014-08-25 19:02 - 00000000 ____D () C:\_OTL
2014-08-25 18:57 - 2014-08-25 18:57 - 00602112 _____ (OldTimer Tools) C:\Users\Dan\Downloads\OTL.exe
2014-08-25 17:25 - 2014-08-25 17:25 - 00033512 _____ () C:\Windows\SysWOW64\Drivers\TrueSight.sys
2014-08-25 17:25 - 2014-08-25 17:25 - 00000000 ____D () C:\ProgramData\RogueKiller
2014-08-25 17:24 - 2014-08-25 17:24 - 04851288 _____ () C:\Users\Dan\Downloads\RogueKiller.exe
2014-08-25 17:10 - 2009-07-13 23:45 - 00430264 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-08-25 17:09 - 2009-10-30 21:23 - 00065232 _____ () C:\Windows\PFRO.log
2014-08-25 10:43 - 2010-07-23 14:51 - 00000000 ____D () C:\Program Files (x86)\Freecorder
2014-08-25 08:32 - 2014-08-25 08:32 - 01329328 _____ () C:\Users\Dan\Downloads\PANDAFREEAV(1).exe
2014-08-25 08:28 - 2014-08-25 08:28 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Panda Security
2014-08-25 08:28 - 2014-08-25 08:26 - 00000000 ____D () C:\Program Files (x86)\Panda Security
2014-08-25 08:28 - 2014-08-25 08:23 - 00000000 ____D () C:\ProgramData\Panda Security
2014-08-25 08:28 - 2009-10-30 19:34 - 00104440 _____ () C:\Users\Dan\AppData\Local\GDIPFONTCACHEV1.DAT
2014-08-25 08:27 - 2014-08-25 08:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Panda Free Antivirus
2014-08-25 08:23 - 2014-08-25 08:23 - 01329312 _____ () C:\Users\Dan\Downloads\PANDAFREEAV.exe
2014-08-25 08:20 - 2012-05-15 06:34 - 00699568 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-08-25 08:20 - 2011-06-07 18:32 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-08-25 08:18 - 2009-07-14 00:13 - 00004994 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-08-25 08:12 - 2014-08-25 03:00 - 00000000 ____D () C:\ProgramData\BoostSoftware
2014-08-25 08:09 - 2014-08-25 03:26 - 00001945 _____ () C:\Windows\epplauncher.mif
2014-08-25 03:26 - 2009-10-30 19:29 - 01375848 _____ () C:\Windows\WindowsUpdate.log
2014-08-25 03:21 - 2014-08-25 03:20 - 13829304 _____ (Microsoft Corporation) C:\Users\Dan\Downloads\mseinstall.exe
2014-08-25 02:59 - 2014-08-25 02:59 - 02958144 _____ (BoostSoftware Inc. ) C:\Users\Dan\Downloads\PCHealthBoost-Setup.exe
2014-08-24 13:08 - 2012-12-16 06:49 - 00000000 ____D () C:\ProgramData\Wincert
2014-08-24 13:07 - 2012-01-10 19:46 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Belkin
2014-08-24 13:07 - 2012-01-10 19:46 - 00000000 ____D () C:\Program Files (x86)\Belkin
2014-08-24 13:01 - 2010-03-10 19:59 - 00000000 ____D () C:\ProgramData\WinZip
2014-08-24 13:01 - 2009-10-30 19:29 - 00000000 ____D () C:\Users\Dan
2014-08-24 13:00 - 2014-08-24 12:59 - 00000000 ____D () C:\Users\Dan\AppData\Local\Adobe
2014-08-24 13:00 - 2009-08-24 23:22 - 00000000 ____D () C:\ProgramData\Adobe
2014-08-24 12:54 - 2014-08-24 12:53 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-08-24 11:33 - 2009-11-17 01:20 - 00000000 ____D () C:\Program Files (x86)\Yahoo!
2014-08-24 11:32 - 2009-07-14 00:32 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games
2014-08-24 11:31 - 2009-08-24 23:21 - 00000000 ____D () C:\Windows\System32\Tasks\ASUS
2014-08-24 11:31 - 2009-08-24 23:21 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ASUS
2014-08-24 11:31 - 2009-08-24 23:20 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-08-24 11:31 - 2009-08-24 23:19 - 00000000 ____D () C:\Program Files (x86)\ASUS
2014-08-23 22:45 - 2010-01-01 22:54 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Skype
2014-08-14 01:45 - 2010-01-01 22:54 - 00000000 ___RD () C:\Program Files (x86)\Skype
2014-08-14 00:52 - 2014-08-14 00:52 - 00001787 _____ () C:\Users\Public\Desktop\iTunes.lnk
2014-08-14 00:52 - 2014-08-14 00:52 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iPod
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files (x86)\iTunes

ZeroAccess:
C:\$Recycle.Bin\S-1-5-21-2015888278-3637765471-366299829-1001\$7d049a04e11b896b2a9dfd255201f599

ZeroAccess:
C:\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599

Files to move or delete:
====================
C:\Users\Dan\jagex_runescape_preferences.dat
C:\Users\Dan\jagex_runescape_preferences2.dat


Some content of TEMP:
====================
C:\Users\Dan\AppData\Local\Temp\AdobeUpdater12345.exe
C:\Users\Dan\AppData\Local\Temp\conhost.exe
C:\Users\Dan\AppData\Local\Temp\e.dll
C:\Users\Dan\AppData\Local\Temp\fvJcrgR.exe
C:\Users\Dan\AppData\Local\Temp\InstallFlashPlayer.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_140cf8a4.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_7004b633.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_b3113484.exe
C:\Users\Dan\AppData\Local\Temp\{F72FF6B1-02E0-472F-8CFD-A9D7DACDD19A}.exe


==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed


LastRegBack: 2014-08-14 02:25

==================== End Of Log ============================

 

 

 

 

 

 

 

 

 

 

 

 

Additional scan result of Farbar Recovery Scan Tool (x64) Version: 25-08-2014
Ran by Dan at 2014-08-27 07:20:36
Running from C:\Users\Dan\Downloads
Boot Mode: Normal
==========================================================


==================== Security Center ========================

(If an entry is included in the fixlist, it will be removed.)

AV: AVG Anti-Virus Free (Enabled - Up to date) {5A2746B1-DEE9-F85A-FBCD-ADB11639C5F0}
AS: AVG Anti-Virus Free (Enabled - Up to date) {E146A755-F8D3-F7D4-C17D-96C36DBE8F4D}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

==================== Installed Programs ======================

(Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)

 Update for Microsoft Office 2007 (KB2508958) (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{0C5823AA-7B6F-44E1-8D5B-8FD1FF0E6438}) (Version:  - Microsoft)
Adobe Flash Player 14 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 14.0.0.176 - Adobe Systems Incorporated)
Adobe Flash Player 14 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 14.0.0.179 - Adobe Systems Incorporated)
Apple Application Support (HKLM-x32\...\{78002155-F025-4070-85B3-7C0453561701}) (Version: 3.0.6 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{6AF2AC2A-3532-43FD-9F4D-BDC9C0D724C7}) (Version: 7.1.2.6 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
ASUSUpdate (HKLM-x32\...\{587178E7-B1DF-494E-9838-FA4DD36E873C}) (Version:  - )
Audacity 1.2.6 (HKLM-x32\...\Audacity_is1) (Version:  - )
AutocompletePro (HKLM-x32\...\AutocompletePro3_is1) (Version:  - ) <==== ATTENTION
Baldur's Gate & Tales of the Sword Coast (HKLM-x32\...\Baldur's Gate & Tales of the Sword Coast) (Version:  - )
Baldur's Gate (HKLM-x32\...\Baldur's Gate) (Version:  - )
Baldur's Gate™ II - Throne of Bhaal ™ (HKLM-x32\...\{B8C3B479-1716-11D5-968A-0050BA84F5F7}) (Version:  - )
Bing Rewards Client Installer (x32 Version: 16.0.345.0 - Microsoft Corporation) Hidden
Bonjour (HKLM\...\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}) (Version: 3.0.0.10 - Apple Inc.)
Civilization III (HKLM-x32\...\{0AD84416-63A4-4CF3-BDDF-8FA866711FB0}) (Version:  - )
Command & Conquer The First Decade (HKLM-x32\...\{66D6F3BD-CA23-41A4-9FA3-96B26B32528C}) (Version: 1.00.0000 - Electronic Arts)
Compatibility Pack for the 2007 Office system (HKLM-x32\...\{90120000-0020-0409-0000-0000000FF1CE}) (Version: 12.0.6612.1000 - Microsoft Corporation)
Diablo (HKCU\...\Diablo) (Version:  - )
Diablo (HKLM-x32\...\Diablo) (Version:  - )
Diablo II (HKLM-x32\...\Diablo II) (Version:  - )
Diablo III (HKLM-x32\...\Diablo III) (Version: 1.0.6.13644 - Blizzard Entertainment)
Emulator Starter (HKCU\...\86aa6cbda7a618e2) (Version: 1.0.0.53 - Free Game Empire)
EPU-4 Engine (HKLM-x32\...\{8F66047B-1AF3-40D9-80D7-106E2EDC2C2A}) (Version: 1.00.25 - )
FINAL FANTASY XI (HKLM-x32\...\InstallShield_{678F6475-D227-432A-94FF-806178A34520}) (Version: 1.011.0 - SQUARE ENIX CO., LTD.)
FINAL FANTASY XI (x32 Version: 1.011.0 - SQUARE ENIX CO., LTD.) Hidden
FINAL FANTASY XI Seekers of Adoulin (x32 Version: 1.50.0 - SQUARE ENIX CO., LTD.) Hidden
FINAL FANTASY XI: Chains of Promathia (HKLM-x32\...\InstallShield_{3C0619B4-4A2C-4244-8077-488E420DF907}) (Version: 1.28.0 - SQUARE ENIX CO., LTD.)
FINAL FANTASY XI: Chains of Promathia (x32 Version: 1.28.0 - SQUARE ENIX CO., LTD.) Hidden
FINAL FANTASY XI: Rise of the Zilart (HKLM-x32\...\InstallShield_{6FC76C41-8C1D-4B43-85E7-0BAA2002F1BE}) (Version: 1.19.0 - SQUARE ENIX CO., LTD.)
FINAL FANTASY XI: Rise of the Zilart (x32 Version: 1.19.0 - SQUARE ENIX CO., LTD.) Hidden
FINAL FANTASY XI: Seekers of Adoulin (HKLM-x32\...\InstallShield_{E86A33A7-6C77-48F3-9D72-2D8F4C1AD5AC}) (Version: 1.50.0 - SQUARE ENIX CO., LTD.)
FINAL FANTASY XI: Treasures of Aht Urhgan (HKLM-x32\...\InstallShield_{A606C6FF-12E7-40BE-B777-D8F360FF00CD}) (Version: 1.36.0 - SQUARE ENIX CO., LTD.)
FINAL FANTASY XI: Treasures of Aht Urhgan (x32 Version: 1.36.0 - SQUARE ENIX CO., LTD.) Hidden
FINAL FANTASY XI: Wings of the Goddess (HKLM-x32\...\InstallShield_{5B037ED7-0755-48D4-9554-808E5AF50F17}) (Version: 1.43.0 - SQUARE ENIX CO., LTD.)
FINAL FANTASY XI: Wings of the Goddess (x32 Version: 1.43.0 - SQUARE ENIX CO., LTD.) Hidden
Finale NotePad 2011 (HKLM-x32\...\Finale NotePad 2011) (Version: 2011..r2.1 - MakeMusic)
Freecorder 4.01 Application (HKLM-x32\...\Freecorder4.01) (Version: 4.01 - Applian Technologies Inc.)
Freecorder Toolbar (HKLM-x32\...\Freecorder Toolbar) (Version:  - ) <==== ATTENTION
FTDownloader (HKLM-x32\...\1ClickDownload) (Version: 2.1 Build 26473 - FTDownloader.com) <==== ATTENTION
Funmoods (HKLM-x32\...\funmoods) (Version:  - Volonet Ltd) <==== ATTENTION
Google Chrome (HKLM-x32\...\Google Chrome) (Version: 36.0.1985.143 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.24.15 - Google Inc.) Hidden
Graboid Video 3.57 (HKLM-x32\...\Graboid Video) (Version: 3.57 - Graboid Inc.)
Icewind Dale - Heart of Winter (HKLM-x32\...\{433BF933-81D6-4646-A318-3DE5DB6108F2}) (Version:  - )
Icewind Dale (HKLM-x32\...\Icewind Dale) (Version:  - )
Icewind Dale II (HKLM-x32\...\{588C135F-0B15-4A02-8F2D-04697BE2904E}) (Version: 1.00.000 - Black Isle)
iLivid (HKLM-x32\...\iLivid) (Version: 4.0.0.2208 - Bandoo Media Inc) <==== ATTENTION
Intel® Graphics Media Accelerator Driver (HKLM\...\HDMI) (Version:  - Intel Corporation)
iTunes (HKLM\...\{77DE5105-D05E-448C-96CB-7FA381903753}) (Version: 11.3.1.2 - Apple Inc.)
Java 7 Update 17 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217017FF}) (Version: 7.0.170 - Oracle)
Java Auto Updater (x32 Version: 2.1.9.0 - Sun Microsystems, Inc.) Hidden
Java™ 6 Update 21 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F86416021FF}) (Version: 6.0.210 - Oracle)
Java™ 6 Update 26 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83216017FF}) (Version: 6.0.260 - Sun Microsystems, Inc.)
JavaFX 2.1.1 (HKLM-x32\...\{1111706F-666A-4037-7777-211328764D10}) (Version: 2.1.1 - Oracle Corporation)
Junk Mail filter update (x32 Version: 14.0.8117.416 - Microsoft Corporation) Hidden
Magic 2014  (HKLM-x32\...\Steam App 213850) (Version:  - Stainless Games)
Magic Online (HKLM-x32\...\{AF7733C1-FB0B-4FED-9730-E0433AF7A2EF}) (Version: 3.00.0000 - Wizards of the Coast)
Magic The Gathering Tactics (HKCU\...\SOE-Magic The Gathering Tactics) (Version:  - Sony Online Entertainment)
Magic: The Gathering - Duels of the Planeswalkers 2013 (HKLM-x32\...\Steam App 97330) (Version:  - )
Microsoft .NET Framework 4 Client Profile (HKLM\...\Microsoft .NET Framework 4 Client Profile) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319 - Microsoft Corporation) Hidden
Microsoft Application Error Reporting (Version: 12.0.6015.5000 - Microsoft Corporation) Hidden
Microsoft Choice Guard (x32 Version: 2.0.48.0 - Microsoft Corporation) Hidden
Microsoft Default Manager (x32 Version: 2.2.114.0 - Microsoft Corporation) Hidden
Microsoft Office 2007 Service Pack 3 (SP3) (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{6E107EB7-8B55-48BF-ACCB-199F86A2CD93}) (Version:  - Microsoft)
Microsoft Office 2007 Service Pack 3 (SP3) (x32 Version:  - Microsoft) Hidden
Microsoft Office Excel 2007 Help Actualización (KB963678) (HKLM-x32\...\{90120000-0016-0C0A-0000-0000000FF1CE}_HOMESTUDENTR_{59E09C3D-4878-47D9-87DB-6D0018026889}) (Version:  - Microsoft)
Microsoft Office Excel MUI (Dutch) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (Spanish) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office File Validation Add-In (HKLM-x32\...\{90140000-2005-0000-0000-0000000FF1CE}) (Version: 14.0.5130.5003 - Microsoft Corporation)
Microsoft Office Home and Student 2007 (HKLM-x32\...\HOMESTUDENTR) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office Home and Student 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Live Add-in 1.5 (HKLM-x32\...\{F40BBEC7-C2A4-4A00-9B24-7A055A2C5262}) (Version: 2.0.4024.1 - Microsoft Corporation)
Microsoft Office Office 64-bit Components 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office OneNote MUI (Dutch) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office OneNote MUI (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office OneNote MUI (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office OneNote MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office OneNote MUI (Spanish) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Powerpoint 2007 Help Actualización (KB963669) (HKLM-x32\...\{90120000-0018-0C0A-0000-0000000FF1CE}_HOMESTUDENTR_{F318245D-05AE-4681-A749-A036CE44AF29}) (Version:  - Microsoft)
Microsoft Office PowerPoint MUI (Dutch) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (Spanish) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint Viewer 2007 (English) (HKLM-x32\...\{95120000-00AF-0409-0000-0000000FF1CE}) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office Proof (Arabic) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Basque) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Catalan) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Dutch) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Galician) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Italian) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Portuguese (Brazil)) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Spanish) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proofing (Dutch) 2007 (x32 Version: 12.0.4518.1017 - Microsoft Corporation) Hidden
Microsoft Office Proofing (English) 2007 (x32 Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Proofing (French) 2007 (x32 Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Proofing (German) 2007 (x32 Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Proofing (Spanish) 2007 (x32 Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3) (x32 Version:  - Microsoft) Hidden
Microsoft Office Shared 64-bit MUI (Dutch) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared 64-bit MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared 64-bit MUI (French) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared 64-bit MUI (German) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared 64-bit MUI (Spanish) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared 64-bit Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (Dutch) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (Spanish) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared Setup Metadata MUI (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Suite Activation Assistant (HKLM-x32\...\{E50AE784-FABE-46DA-A1F8-7B6B56DCB22E}) (Version: 2.9 - Microsoft Corporation)
Microsoft Office Word 2007 Help Actualización (KB963665) (HKLM-x32\...\{90120000-001B-0C0A-0000-0000000FF1CE}_HOMESTUDENTR_{377BA42A-1C84-45D6-94B8-6D00887D172D}) (Version:  - Microsoft)
Microsoft Office Word MUI (Dutch) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (Spanish) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Silverlight (HKLM-x32\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 4.1.10329.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Sync Framework Runtime Native v1.0 (x86) (HKLM-x32\...\{8A74E887-8F0F-4017-AF53-CBA42211AAA5}) (Version: 1.0.1215.0 - Microsoft Corporation)
Microsoft Sync Framework Services Native v1.0 (x86) (HKLM-x32\...\{BD64AF4A-8C80-4152-AD77-FCDDF05208AB}) (Version: 1.0.1215.0 - Microsoft Corporation)
Microsoft UI Engine (x32 Version: 6.3.2380.0 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (HKLM-x32\...\{770657D0-A123-3C07-8E44-1C83EC895118}) (Version: 8.0.50727.4053 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 (HKLM-x32\...\{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Works (HKLM-x32\...\{15BC8CD0-A65B-47D0-A2DD-90A824590FA8}) (Version: 9.7.0621 - Microsoft Corporation)
Microsoft Xbox 360 Accessories 1.2 (HKLM\...\{D9C50188-12D5-4D3E-8F00-682346C2AA5F}) (Version: 1.20.146.0 - Microsoft)
Mise à jour Microsoft Office Excel 2007 Help  (KB963678) (HKLM-x32\...\{90120000-0016-040C-0000-0000000FF1CE}_HOMESTUDENTR_{B761869A-B85C-40E2-994C-A1CE78AC8F2C}) (Version:  - Microsoft)
Mise à jour Microsoft Office Powerpoint 2007 Help  (KB963669) (HKLM-x32\...\{90120000-0018-040C-0000-0000000FF1CE}_HOMESTUDENTR_{C3DCA38E-005E-41BA-A52A-7C3429F351C3}) (Version:  - Microsoft)
Mise à jour Microsoft Office Word 2007 Help  (KB963665) (HKLM-x32\...\{90120000-001B-040C-0000-0000000FF1CE}_HOMESTUDENTR_{81536A04-DBFB-4DB3-978F-0F284590C223}) (Version:  - Microsoft)
Mozilla Firefox 31.0 (x86 en-US) (HKLM-x32\...\Mozilla Firefox 31.0 (x86 en-US)) (Version: 31.0 - Mozilla)
MSVCRT (x32 Version: 14.0.1468.721 - Microsoft) Hidden
MSXML 4.0 SP2 (KB954430) (HKLM-x32\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM-x32\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
Myst III: Exile (HKLM-x32\...\{9F05B89E-2873-11D5-9E9D-0050DA1EA555}) (Version:  - )
Myst Masterpiece Edition (HKLM-x32\...\{7D1CE80E-3EAE-441E-BE97-625F9ABD07D9}) (Version:  - )
Panda Devices Agent (HKLM-x32\...\Panda Devices Agent) (Version: 1.03.03 - Panda Security)
Panda Devices Agent (x32 Version: 1.05.00 - Panda Security) Hidden
Panda Free Antivirus (HKLM-x32\...\Panda Universal Agent Endpoint) (Version: 15.00.01.0000 - Panda Security)
Panda Free Antivirus (Version: 7.23.00.0000 - Panda Security) Hidden
Pando Media Booster (HKLM-x32\...\{980A182F-E0A2-4A40-94C1-AE0C1235902E}) (Version: 2.3.3.9 - Pando Networks Inc.)
PlayOnline Viewer & Tetra Master (HKLM-x32\...\InstallShield_{47004155-7376-403E-89E9-4C9F44AAF0D0}) (Version: 1.18.00 - SQUARE ENIX CO., LTD.)
PlayOnline Viewer & Tetra Master (x32 Version: 1.18.00 - SQUARE ENIX CO., LTD.) Hidden
Pocket RAR documentation (HKLM-x32\...\PocketRAR) (Version:  - )
QuickTime 7 (HKLM-x32\...\{111EE7DF-FC45-40C7-98A7-753AC46B12FB}) (Version: 7.75.80.95 - Apple Inc.)
RealNetworks - Microsoft Visual C++ 2008 Runtime (x32 Version: 9.0 - RealNetworks, Inc) Hidden
RealPlayer (HKLM-x32\...\RealPlayer 15.0) (Version: 15.0.4 - RealNetworks)
Realtek 8136 8168 8169 Ethernet Driver (HKLM-x32\...\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}) (Version: 1.00.0005 - Realtek)
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.5859 - Realtek Semiconductor Corp.)
RealUpgrade 1.1 (x32 Version: 1.1.0 - RealNetworks, Inc.) Hidden
Riven (HKLM-x32\...\{D9577427-2D9D-4580-BDB3-FFDDE06A9554}) (Version:  - )
Sibelius Scorch (ActiveX Only) (HKLM-x32\...\{868291A4-229E-4795-B0B0-E60E87AF53CD}) (Version: 6.2.0 - Sibelius Software)
Skype Click to Call (HKLM-x32\...\{6D1221A9-17BF-4EC0-81F2-27D30EC30701}) (Version: 7.3.16540.9015 - Microsoft Corporation)
Skype™ 6.18 (HKLM-x32\...\{7A3C7E05-EE37-47D6-99E1-2EB05A3DA3F7}) (Version: 6.18.106 - Skype Technologies S.A.)
Steam (HKLM-x32\...\{048298C9-A4D3-490B-9FF9-AB023A9238F3}) (Version: 1.0.0.0 - Valve Corporation)
TeamSpeak 3 Client (HKLM\...\TeamSpeak 3 Client) (Version:  - TeamSpeak Systems GmbH)
Touch Manager (HKLM\...\{5AFA78B0-D9BE-4EBE-ACE4-358F14A32044}) (Version: 1.0.1.1 - )
Update for 2007 Microsoft Office System (KB967642) (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{C444285D-5E4F-48A4-91DD-47AAAA68E92D}) (Version:  - Microsoft)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (HKLM-x32\...\{F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4}.KB2468871) (Version: 1 - Microsoft Corporation)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (HKLM-x32\...\{F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4}.KB2533523) (Version: 1 - Microsoft Corporation)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217) (HKLM-x32\...\{F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4}.KB2600217) (Version: 1 - Microsoft Corporation)
Update for Microsoft Office 2007 Help for Common Features (KB963673) (HKLM-x32\...\{90120000-006E-0409-0000-0000000FF1CE}_HOMESTUDENTR_{AB365889-0395-4FAD-B702-CA5985D53D42}) (Version:  - Microsoft)
Update for Microsoft Office Excel 2007 Help (KB963678) (HKLM-x32\...\{90120000-0016-0409-0000-0000000FF1CE}_HOMESTUDENTR_{199DF7B6-169C-448C-B511-1054101BE9C9}) (Version:  - Microsoft)
Update for Microsoft Office OneNote 2007 Help (KB963670) (HKLM-x32\...\{90120000-00A1-0409-0000-0000000FF1CE}_HOMESTUDENTR_{2744EF05-38E1-4D5D-B333-E021EDAEA245}) (Version:  - Microsoft)
Update for Microsoft Office Powerpoint 2007 Help (KB963669) (HKLM-x32\...\{90120000-0018-0409-0000-0000000FF1CE}_HOMESTUDENTR_{397B1D4F-ED7B-4ACA-A637-43B670843876}) (Version:  - Microsoft)
Update for Microsoft Office Script Editor Help (KB963671) (HKLM-x32\...\{90120000-006E-0409-0000-0000000FF1CE}_HOMESTUDENTR_{CD11C6A2-FFC6-4271-8EAB-79C3582F505C}) (Version:  - Microsoft)
Update for Microsoft Office Word 2007 Help (KB963665) (HKLM-x32\...\{90120000-001B-0409-0000-0000000FF1CE}_HOMESTUDENTR_{80E762AA-C921-4839-9D7D-DB62A72C0726}) (Version:  - Microsoft)
Update für Microsoft Office Excel 2007 Help (KB963678) (HKLM-x32\...\{90120000-0016-0407-0000-0000000FF1CE}_HOMESTUDENTR_{BEC163EC-7A83-48A1-BFB6-3BF47CC2F8CF}) (Version:  - Microsoft)
Update für Microsoft Office Powerpoint 2007 Help (KB963669) (HKLM-x32\...\{90120000-0018-0407-0000-0000000FF1CE}_HOMESTUDENTR_{EA160DA3-E9B5-4D03-A518-21D306665B96}) (Version:  - Microsoft)
Update für Microsoft Office Word 2007 Help (KB963665) (HKLM-x32\...\{90120000-001B-0407-0000-0000000FF1CE}_HOMESTUDENTR_{38472199-D7B6-4833-A949-10E4EE6365A1}) (Version:  - Microsoft)
Update voor Microsoft Office Excel 2007 Help (KB963678) (HKLM-x32\...\{90120000-0016-0413-0000-0000000FF1CE}_HOMESTUDENTR_{5CF7002F-6F49-4482-9564-5614FBE560FA}) (Version:  - Microsoft)
Update voor Microsoft Office Powerpoint 2007 Help (KB963669) (HKLM-x32\...\{90120000-0018-0413-0000-0000000FF1CE}_HOMESTUDENTR_{15D84E79-1ED7-42C5-B2FD-745C3FBDDDC5}) (Version:  - Microsoft)
Update voor Microsoft Office Word 2007 Help (KB963665) (HKLM-x32\...\{90120000-001B-0413-0000-0000000FF1CE}_HOMESTUDENTR_{A66AE6A1-8D8C-4102-BC18-38CBDE40F809}) (Version:  - Microsoft)
Visual C++ 8.0 Runtime Setup Package (x64) (HKLM-x32\...\{2FDBBCEA-62DB-45F4-B6E5-0E1FB2A1F29D}) (Version: 9.0.0.623 - AVG Technologies CZ, s.r.o.)
VLC media player 1.0.1 (HKLM-x32\...\VLC media player) (Version: 1.0.1 - VideoLAN Team)
Warcraft II BNE (HKLM-x32\...\Warcraft II BNE) (Version:  - )
WIDCOMM Bluetooth Software 6.0.1.4900 (HKLM\...\{03D1988F-469F-4843-8E6E-E5FE9D17889D}) (Version: 6.0.1.4900 - Broadcom Corporation)
Windows Live Call (x32 Version: 14.0.8117.0416 - Microsoft Corporation) Hidden
Windows Live Communications Platform (x32 Version: 14.0.8117.416 - Microsoft Corporation) Hidden
Windows Live Essentials (HKLM-x32\...\WinLiveSuite_Wave3) (Version: 14.0.8117.0416 - Microsoft Corporation)
Windows Live Essentials (x32 Version: 14.0.8117.416 - Microsoft Corporation) Hidden
Windows Live Family Safety (Version: 14.0.8064.206 - Microsoft Corporation) Hidden
Windows Live ID Sign-in Assistant (HKLM\...\{9B48B0AC-C813-4174-9042-476A887592C7}) (Version: 6.500.3165.0 - Microsoft Corporation)
Windows Live Mail (x32 Version: 14.0.8117.0416 - Microsoft Corporation) Hidden
Windows Live Messenger (x32 Version: 14.0.8117.0416 - Microsoft Corporation) Hidden
Windows Live Movie Maker Beta (x32 Version: 14.0.8064.0206 - Microsoft Corporation) Hidden
Windows Live Photo Gallery (x32 Version: 14.0.8064.206 - Microsoft Corporation) Hidden
Windows Live Sync (HKLM-x32\...\{A1BF9950-8CDB-468E-83FA-EACFB00EA7D5}) (Version: 14.0.8064.206 - Microsoft Corporation)
Windows Live Upload Tool (HKLM-x32\...\{205C6BDD-7B73-42DE-8505-9A093F35A238}) (Version: 14.0.8014.1029 - Microsoft Corporation)
Windows Live Writer (x32 Version: 14.0.8064.0206 - Microsoft Corporation) Hidden
WinRAR archiver (HKLM-x32\...\WinRAR archiver) (Version:  - )
Yahtzee Master v1.47 (HKLM-x32\...\Yahtzee Master_is1) (Version:  - James Garton)

==================== Custom CLSID (selected items): ==========================

(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)

CustomCLSID: HKU\S-1-5-21-2015888278-3637765471-366299829-1001_Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32 -> rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 247 more characters). <==== Poweliks?

==================== Restore Points  =========================


==================== Hosts content: ==========================

(If needed Hosts: directive could be included in the fixlist to reset Hosts.)

2009-07-13 21:34 - 2009-06-10 16:00 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)

Task: {168BECB9-FB5B-45BF-BAD9-9B370CF2AA8A} - \GoogleUpdateTaskMachineUA No Task File <==== ATTENTION
Task: {2778B84A-25E0-42EF-8605-083BD5ABBC1D} - System32\Tasks\ASUS\ASUS RegRun Loader => C:\Program Files (x86)\ASUS\AASP\1.00.97\AsLoader.exe [2009-08-19] (ASUSTeK Computer Inc.)
Task: {39690FFC-6767-4D0D-A335-C01854FFC30D} - \{157D9429-F7A2-4729-93E5-9109E157DDEC} No Task File <==== ATTENTION
Task: {56F4C9B6-E49D-4C1D-AA86-7F2D50DA6BDC} - \RealUpgradeLogonTaskS-1-5-21-2015888278-3637765471-366299829-1001 No Task File <==== ATTENTION
Task: {629D3E9F-5C26-409F-9229-D07F73E0B3C4} - \GoogleUpdateTaskMachineCore No Task File <==== ATTENTION
Task: {716930D6-FCE7-4716-B126-1A14FE6E4642} - \Adobe Flash Player Updater No Task File <==== ATTENTION
Task: {740CA77E-3D8A-414D-8614-EA0FDC33C291} - System32\Tasks\ASUS\ASUS Update Checker => C:\Program Files (x86)\ASUS\ASUSUpdate\UpdateChecker\UpdateChecker.exe [2008-12-11] ()
Task: {852B8C70-8985-4F06-B152-84833F5FB1CD} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files (x86)\Apple Software Update\SoftwareUpdate.exe [2011-06-01] (Apple Inc.)
Task: {C0E81A46-6CC2-4F4F-981B-2C24276EA546} - System32\Tasks\ASUS\ASUS SIX Engine => C:\Program Files (x86)\ASUS\EPU-4 Engine\FourEngine.exe [2009-06-04] ()
Task: {CBDD5F7D-945B-4CF0-9E33-CF07D6CD2F12} - \RealUpgradeScheduledTaskS-1-5-21-2015888278-3637765471-366299829-1001 No Task File <==== ATTENTION
Task: {CC03C2EB-27F1-42FC-BD43-3267C6F20BCA} - \{FE10ED0B-1BE9-4158-ADD7-BD7F4E9580B8} No Task File <==== ATTENTION
Task: {F72F899F-B0BC-4093-9B00-9EDE5B10665A} - \{36111CFD-CF36-43C1-8AE8-A5DEB3779B61} No Task File <==== ATTENTION
Task: {F8F90DB2-3F30-42A9-85AD-5F99165F5869} - \{C4FF0E94-B7DD-4B11-A18B-F35437A1E14D} No Task File <==== ATTENTION
Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

==================== Loaded Modules (whitelisted) =============

2007-03-29 14:11 - 2007-03-29 14:11 - 00167936 _____ () C:\Program Files\WIDCOMM\Bluetooth Software\btkeyind.dll
2010-05-16 12:17 - 2010-03-15 11:28 - 00052224 _____ () C:\Program Files (x86)\WinRAR\rarext64.dll
2009-08-24 23:21 - 2009-06-04 17:10 - 05777408 _____ () C:\Program Files (x86)\ASUS\EPU-4 Engine\FourEngine.exe
2009-06-16 13:06 - 2009-06-16 13:06 - 00318464 _____ () C:\Program Files\LTONHIS\Touch Manager\SKDaemon.exe
2008-01-16 11:18 - 2008-01-16 11:18 - 00260096 _____ () C:\Program Files\LTONHIS\Touch Manager\SKHooks.dll
2010-04-04 21:55 - 2010-04-04 21:55 - 02938552 _____ () C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
2007-03-29 13:53 - 2007-03-29 13:53 - 00477184 _____ () C:\Windows\system32\btwhidcs.DLL
2014-01-20 14:17 - 2014-01-20 14:17 - 00073544 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\zlib1.dll
2014-01-20 14:16 - 2014-01-20 14:16 - 01044808 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxml2.dll
2009-08-24 23:21 - 2009-01-15 16:55 - 00565248 _____ () C:\Program Files (x86)\ASUS\EPU-4 Engine\pngio.dll
2009-08-24 23:21 - 2009-03-25 18:53 - 00053248 _____ () C:\Program Files (x86)\ASUS\EPU-4 Engine\AsSpindownTimeout.dll
2013-04-12 12:23 - 2013-04-12 12:23 - 00612664 _____ () C:\Program Files (x86)\Panda Security\Panda Security Protection\SQLite3.dll
2014-08-24 12:53 - 2014-08-24 12:54 - 03800688 _____ () C:\Program Files (x86)\Mozilla Firefox\mozjs.dll

==================== Alternate Data Streams (whitelisted) =========

(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)

AlternateDataStreams: C:\ProgramData\TEMP:D9FA218A

==================== Safe Mode (whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NanoServiceMain => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PSUAService => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\NanoServiceMain => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\PSUAService => ""="Service"

==================== EXE Association (whitelisted) =============

(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)


==================== MSCONFIG/TASK MANAGER disabled items =========

(Currently there is no automatic fix for this section.)


==================== Faulty Device Manager Devices =============


==================== Event log errors: =========================

Application errors:
==================
Error: (08/27/2014 03:49:39 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 9.0.8112.16448, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 9.0.8112.16448, time stamp: 0x4fecfb0e
Exception code: 0xc0000005
Fault offset: 0x002627f8
Faulting process id: 0x1b68
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (08/27/2014 03:47:47 AM) (Source: Application Error) (EventID: 1005) (User: )
Description: Windows cannot access the file  for one of the following reasons:
there is a problem with the network connection, the disk that the file is stored on, or the storage
drivers installed on this computer; or the disk is missing.
Windows closed the program Internet Explorer because of this error.

Program: Internet Explorer
File:

The error value is listed in the Additional Data section.
User Action
1. Open the file again.
This situation might be a temporary problem that corrects itself when the program runs again.
2.
If the file still cannot be accessed and
    - It is on the network,
your network administrator should verify that there is not a problem with the network and that the server can be contacted.
    - It is on a removable disk, for example, a floppy disk or CD-ROM, verify that the disk is fully inserted into the computer.
3. Check and repair the file system by running CHKDSK. To run CHKDSK, click Start, click Run, type CMD, and then click OK. At the command prompt, type CHKDSK /F, and then press ENTER.
4. If the problem persists, restore the file from a backup copy.
5. Determine whether other files on the same disk can be opened. If not, the disk might be damaged. If it is a hard disk, contact your administrator or computer hardware vendor for
further assistance.

Additional Data
Error value: 00000000
Disk type: 0

Error: (08/27/2014 03:47:47 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 9.0.8112.16448, time stamp: 0x4a5bc6b7
Faulting module name: kernel32.dll, version: 6.1.7601.17651, time stamp: 0x4e211318
Exception code: 0xc000001d
Fault offset: 0x00013f2e
Faulting process id: 0x2a78
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (08/26/2014 11:02:27 PM) (Source: Application Error) (EventID: 1005) (User: )
Description: Windows cannot access the file  for one of the following reasons:
there is a problem with the network connection, the disk that the file is stored on, or the storage
drivers installed on this computer; or the disk is missing.
Windows closed the program Internet Explorer because of this error.

Program: Internet Explorer
File:

The error value is listed in the Additional Data section.
User Action
1. Open the file again.
This situation might be a temporary problem that corrects itself when the program runs again.
2.
If the file still cannot be accessed and
    - It is on the network,
your network administrator should verify that there is not a problem with the network and that the server can be contacted.
    - It is on a removable disk, for example, a floppy disk or CD-ROM, verify that the disk is fully inserted into the computer.
3. Check and repair the file system by running CHKDSK. To run CHKDSK, click Start, click Run, type CMD, and then click OK. At the command prompt, type CHKDSK /F, and then press ENTER.
4. If the problem persists, restore the file from a backup copy.
5. Determine whether other files on the same disk can be opened. If not, the disk might be damaged. If it is a hard disk, contact your administrator or computer hardware vendor for
further assistance.

Additional Data
Error value: 00000000
Disk type: 0

Error: (08/26/2014 11:02:27 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 9.0.8112.16448, time stamp: 0x4a5bc6b7
Faulting module name: kernel32.dll, version: 6.1.7601.17651, time stamp: 0x4e211318
Exception code: 0xc000001d
Fault offset: 0x00013f2e
Faulting process id: 0x45d0
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (08/26/2014 10:47:21 PM) (Source: Application Error) (EventID: 1005) (User: )
Description: Windows cannot access the file  for one of the following reasons:
there is a problem with the network connection, the disk that the file is stored on, or the storage
drivers installed on this computer; or the disk is missing.
Windows closed the program Internet Explorer because of this error.

Program: Internet Explorer
File:

The error value is listed in the Additional Data section.
User Action
1. Open the file again.
This situation might be a temporary problem that corrects itself when the program runs again.
2.
If the file still cannot be accessed and
    - It is on the network,
your network administrator should verify that there is not a problem with the network and that the server can be contacted.
    - It is on a removable disk, for example, a floppy disk or CD-ROM, verify that the disk is fully inserted into the computer.
3. Check and repair the file system by running CHKDSK. To run CHKDSK, click Start, click Run, type CMD, and then click OK. At the command prompt, type CHKDSK /F, and then press ENTER.
4. If the problem persists, restore the file from a backup copy.
5. Determine whether other files on the same disk can be opened. If not, the disk might be damaged. If it is a hard disk, contact your administrator or computer hardware vendor for
further assistance.

Additional Data
Error value: 00000000
Disk type: 0

Error: (08/26/2014 10:47:21 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 9.0.8112.16448, time stamp: 0x4a5bc6b7
Faulting module name: kernel32.dll, version: 6.1.7601.17651, time stamp: 0x4e211318
Exception code: 0xc000001d
Fault offset: 0x00013f2e
Faulting process id: 0xfe0
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (08/26/2014 09:11:07 PM) (Source: Application Error) (EventID: 1005) (User: )
Description: Windows cannot access the file  for one of the following reasons:
there is a problem with the network connection, the disk that the file is stored on, or the storage
drivers installed on this computer; or the disk is missing.
Windows closed the program Internet Explorer because of this error.

Program: Internet Explorer
File:

The error value is listed in the Additional Data section.
User Action
1. Open the file again.
This situation might be a temporary problem that corrects itself when the program runs again.
2.
If the file still cannot be accessed and
    - It is on the network,
your network administrator should verify that there is not a problem with the network and that the server can be contacted.
    - It is on a removable disk, for example, a floppy disk or CD-ROM, verify that the disk is fully inserted into the computer.
3. Check and repair the file system by running CHKDSK. To run CHKDSK, click Start, click Run, type CMD, and then click OK. At the command prompt, type CHKDSK /F, and then press ENTER.
4. If the problem persists, restore the file from a backup copy.
5. Determine whether other files on the same disk can be opened. If not, the disk might be damaged. If it is a hard disk, contact your administrator or computer hardware vendor for
further assistance.

Additional Data
Error value: 00000000
Disk type: 0

Error: (08/26/2014 09:11:07 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 9.0.8112.16448, time stamp: 0x4a5bc6b7
Faulting module name: kernel32.dll, version: 6.1.7601.17651, time stamp: 0x4e211318
Exception code: 0xc000001d
Fault offset: 0x00013f2e
Faulting process id: 0x36f4
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (08/26/2014 03:10:14 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: etefz.exe, version: 3.0.4.1, time stamp: 0x53d75949
Faulting module name: mshtml.dll, version: 9.0.8112.16448, time stamp: 0x4fecfb0e
Exception code: 0xc0000005
Fault offset: 0x002627f8
Faulting process id: 0x23b8
Faulting application start time: 0xetefz.exe0
Faulting application path: etefz.exe1
Faulting module path: etefz.exe2
Report Id: etefz.exe3


System errors:
=============
Error: (08/27/2014 07:02:52 AM) (Source: DCOM) (EventID: 10010) (User: )
Description: {AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}

Error: (08/25/2014 07:09:10 PM) (Source: DCOM) (EventID: 10010) (User: )
Description: {AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}

Error: (08/25/2014 07:06:42 PM) (Source: Service Control Manager) (EventID: 7006) (User: )
Description: The ScRegSetValueExW call failed for FailureActions with the following error:
%%5

Error: (08/25/2014 07:06:18 PM) (Source: Service Control Manager) (EventID: 7023) (User: )
Description: The Function Discovery Resource Publication service terminated with the following error:
%%-2147024891

Error: (08/25/2014 05:25:05 PM) (Source: Application Popup) (EventID: 1060) (User: )
Description: \??\C:\Windows\SysWow64\drivers\TrueSight.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.

Error: (08/25/2014 05:12:21 PM) (Source: DCOM) (EventID: 10010) (User: )
Description: {AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}

Error: (08/25/2014 05:10:27 PM) (Source: Service Control Manager) (EventID: 7006) (User: )
Description: The ScRegSetValueExW call failed for FailureActions with the following error:
%%5

Error: (08/25/2014 05:10:13 PM) (Source: Service Control Manager) (EventID: 7023) (User: )
Description: The Function Discovery Resource Publication service terminated with the following error:
%%-2147024891

Error: (08/25/2014 02:39:36 PM) (Source: volsnap) (EventID: 36) (User: )
Description: The shadow copies of volume C: were aborted because the shadow copy storage could not grow due to a user imposed limit.

Error: (08/25/2014 08:29:20 AM) (Source: Service Control Manager) (EventID: 7006) (User: )
Description: The ScRegSetValueExW call failed for FailureActions with the following error:
%%5


Microsoft Office Sessions:
=========================
Error: (07/09/2010 04:04:17 PM) (Source: Microsoft Office 12 Sessions) (EventID: 7001) (User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6535.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 954 seconds with 720 seconds of active time.  This session ended with a crash.


==================== Memory info ===========================

Processor: Intel® Core™2 Quad CPU Q8300 @ 2.50GHz
Percentage of memory in use: 51%
Total physical RAM: 8157.12 MB
Available physical RAM: 3986.62 MB
Total Pagefile: 16312.43 MB
Available Pagefile: 9912.64 MB
Total Virtual: 8192 MB
Available Virtual: 8191.8 MB

==================== Drives ================================

Drive c: (WIN7) (Fixed) (Total:372.61 GB) (Free:93.76 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
Drive d: (DATA) (Fixed) (Total:550.9 GB) (Free:449.96 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (Size: 931.5 GB) (Disk ID: EB2DE2E2)
Partition 1: (Not Active) - (Size=8 GB) - (Type=1B)
Partition 2: (Active) - (Size=372.6 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=550.9 GB) - (Type=07 NTFS)

==================== End Of Log ============================



#6 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 27 August 2014 - 10:10 AM

Hi Fell,
 
I must give you this warning:
 
Looking through your logs, one or more of your infections has been identified as a Backdoor Trojan. These threats have backdoor functionality which allows hackers to remotely control your computer, steal critical system information, and download and execute files.
 
I highly suggest you to disconnect this PC from the Internet immediately, and if possible use a clean computer and a flash drive to transfer the programs I request for you to run. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable. It would be wise to contact those same financial institutions to notify them of your situation.
 
Due to the nature of this trojan, your computer is very likely to be compromised. There is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:
 
How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall
 
We can still clean this machine, but I can't guarantee that it will be 100% secure afterwards. If you decide to continue cleaning this machine, follow on with the rest of the steps posted below. If you do not want to clean this machine, please let me know.
 
--------------

We need to remove some programs with Revo Uninstaller Free:
 
Note: Revo Uninstaller is more thorough in deleting programs on your computer than using the Add/Remove option in Windows. Since it is a more powerful tool, please be sure to follow the instructions carefully.
Note: If the program you want to uninstall is not listed by Revo, let me know and we will try an altenate method of removal.

  • Please download and install Revo Uninstaller Free
    note: there is no need to click anything on that page, the download will start automatically
  • Double click Revo Uninstaller to run it
  • From the list of programs double click on the listed program(s), or anything similar, to remove it:
AutocompletePro
Freecorder Toolbar
FTDownloader
Funmoods
iLivid
Pando Media Booster
  • When prompted if you want to uninstall click Yes
  • Be sure the Moderate option is selected then click Next
  • The program will run, If prompted again click Yes
  • When the built-in uninstaller is finished click on Next
  • Once the program has searched for leftovers click Next
  • Check the items in bold only on the list then click Delete
    note: you may have to expand some folders by clicking the "+" mark
  • When prompted click on Yes and then on Next
  • Put a check on any folders that are found and select Delete
  • When prompted select Yes then Next
  • Once done click Finish

--------------
 

We need to run a fix with FRST:

  • Press the windows key Windows_Logo_key.gif + r on your keyboard at the same time. Type in notepad and press Enter.
  • Copy and paste the script below in the notepad document:​
cmd: taskkill /f /im dllhost.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
HKLM-x32\...\RunOnce: [AvgUninstallURL] => cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-app?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA"&"inst=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"&"prod=90"&"ver=9.0.894
HKLM Group Policy restriction on software: C:\Documents and Settings\All Users\Application Data\McAfee <====== ATTENTION
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Bitberry] => C:\Users\Dan\AppData\Roaming\bssbdgdt\etvuetvw.exe [143872 2010-11-20] ()
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Totayvizdaqoi] => C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe [464896 2014-08-27] (Intel Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...409d6c4515e9\InprocServer32: [Default-shell32]  <==== ATTENTION!
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!
C:\Users\Dan\AppData\Roaming\Coicbey
C:\Users\Dan\AppData\Roaming\bssbdgdt
2014-08-27 01:26 - 2014-08-27 01:26 - 00000000 ___HD () C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}
2014-08-25 22:56 - 2012-03-19 00:22 - 00000024 _____ () C:\Users\Dan\Desktop\Yahtzee.dat
2014-08-25 19:56 - 2012-03-19 00:40 - 00000154 _____ () C:\Users\Dan\Desktop\hi.dat
C:\$Recycle.Bin\S-1-5-21-2015888278-3637765471-366299829-1001\$7d049a04e11b896b2a9dfd255201f599
C:\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599
Winsock: Catalog5 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5 09 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
Winsock: Catalog5-x64 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5-x64 09 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
cmd: netsh winsock reset
C:\Users\Dan\AppData\Local\Temp\AdobeUpdater12345.exe
C:\Users\Dan\AppData\Local\Temp\conhost.exe
C:\Users\Dan\AppData\Local\Temp\e.dll
C:\Users\Dan\AppData\Local\Temp\fvJcrgR.exe
C:\Users\Dan\AppData\Local\Temp\InstallFlashPlayer.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_140cf8a4.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_7004b633.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_b3113484.exe
C:\Users\Dan\AppData\Local\Temp\{F72FF6B1-02E0-472F-8CFD-A9D7DACDD19A}.exe
Task: {168BECB9-FB5B-45BF-BAD9-9B370CF2AA8A} - \GoogleUpdateTaskMachineUA No Task File <==== ATTENTION
Task: {39690FFC-6767-4D0D-A335-C01854FFC30D} - \{157D9429-F7A2-4729-93E5-9109E157DDEC} No Task File <==== ATTENTION
Task: {56F4C9B6-E49D-4C1D-AA86-7F2D50DA6BDC} - \RealUpgradeLogonTaskS-1-5-21-2015888278-3637765471-366299829-1001 No Task File <==== ATTENTION
Task: {629D3E9F-5C26-409F-9229-D07F73E0B3C4} - \GoogleUpdateTaskMachineCore No Task File <==== ATTENTION
Task: {716930D6-FCE7-4716-B126-1A14FE6E4642} - \Adobe Flash Player Updater No Task File <==== ATTENTION
Task: {CBDD5F7D-945B-4CF0-9E33-CF07D6CD2F12} - \RealUpgradeScheduledTaskS-1-5-21-2015888278-3637765471-366299829-1001 No Task File <==== ATTENTION
Task: {CC03C2EB-27F1-42FC-BD43-3267C6F20BCA} - \{FE10ED0B-1BE9-4158-ADD7-BD7F4E9580B8} No Task File <==== ATTENTION
Task: {F72F899F-B0BC-4093-9B00-9EDE5B10665A} - \{36111CFD-CF36-43C1-8AE8-A5DEB3779B61} No Task File <==== ATTENTION
Task: {F8F90DB2-3F30-42A9-85AD-5F99165F5869} - \{C4FF0E94-B7DD-4B11-A18B-F35437A1E14D} No Task File <==== ATTENTION
AlternateDataStreams: C:\ProgramData\TEMP:D9FA218A
  • Save the file to your desktop and name it as fixlist.txt

Note: It's important that both files, FRST.exe/FRST64.exe and fixlist.txt are in the same location or the fix will not work
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

  • Run FRST.exe/FRST64.exe and press the Fix button just once and wait
  • If for some reason the tool needs a restart, please make sure you let the system restart normally, then let the tool complete its run
  • When finished, FRST will generate a log (Fixlog.txt) in the same location the tool was run.
  • Please copy and paste the log in your next reply.

--------------
 
Please download AdwCleaner by Xplode and save to your Desktop.

  • Double click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
  • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.

--------------
 
To recap, in your next reply I would like to see the following. Make sure to copy & paste them unless I ask otherwise:

  • Fixlog.txt
  • AdwCleaner scan log

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#7 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 27 August 2014 - 11:49 PM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 25-08-2014
Ran by Dan at 2014-08-27 23:24:49 Run:1
Running from C:\Users\Dan\Downloads
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
cmd: taskkill /f /im dllhost.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
(Intel Corporation) C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe
HKLM-x32\...\RunOnce: [AvgUninstallURL] => cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-app?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA"&"inst=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"&"prod=90"&"ver=9.0.894
HKLM Group Policy restriction on software: C:\Documents and Settings\All Users\Application Data\McAfee <====== ATTENTION
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Bitberry] => C:\Users\Dan\AppData\Roaming\bssbdgdt\etvuetvw.exe [143872 2010-11-20] ()
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Totayvizdaqoi] => C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe [464896 2014-08-27] (Intel Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...409d6c4515e9\InprocServer32: [Default-shell32]  <==== ATTENTION!
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!
C:\Users\Dan\AppData\Roaming\Coicbey
C:\Users\Dan\AppData\Roaming\bssbdgdt
2014-08-27 01:26 - 2014-08-27 01:26 - 00000000 ___HD () C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}
2014-08-25 22:56 - 2012-03-19 00:22 - 00000024 _____ () C:\Users\Dan\Desktop\Yahtzee.dat
2014-08-25 19:56 - 2012-03-19 00:40 - 00000154 _____ () C:\Users\Dan\Desktop\hi.dat
C:\$Recycle.Bin\S-1-5-21-2015888278-3637765471-366299829-1001\$7d049a04e11b896b2a9dfd255201f599
C:\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599
Winsock: Catalog5 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5 09 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
Winsock: Catalog5-x64 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5-x64 09 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
cmd: netsh winsock reset
C:\Users\Dan\AppData\Local\Temp\AdobeUpdater12345.exe
C:\Users\Dan\AppData\Local\Temp\conhost.exe
C:\Users\Dan\AppData\Local\Temp\e.dll
C:\Users\Dan\AppData\Local\Temp\fvJcrgR.exe
C:\Users\Dan\AppData\Local\Temp\InstallFlashPlayer.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_140cf8a4.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_7004b633.exe
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_b3113484.exe
C:\Users\Dan\AppData\Local\Temp\{F72FF6B1-02E0-472F-8CFD-A9D7DACDD19A}.exe
Task: {168BECB9-FB5B-45BF-BAD9-9B370CF2AA8A} - \GoogleUpdateTaskMachineUA No Task File <==== ATTENTION
Task: {39690FFC-6767-4D0D-A335-C01854FFC30D} - \{157D9429-F7A2-4729-93E5-9109E157DDEC} No Task File <==== ATTENTION
Task: {56F4C9B6-E49D-4C1D-AA86-7F2D50DA6BDC} - \RealUpgradeLogonTaskS-1-5-21-2015888278-3637765471-366299829-1001 No Task File <==== ATTENTION
Task: {629D3E9F-5C26-409F-9229-D07F73E0B3C4} - \GoogleUpdateTaskMachineCore No Task File <==== ATTENTION
Task: {716930D6-FCE7-4716-B126-1A14FE6E4642} - \Adobe Flash Player Updater No Task File <==== ATTENTION
Task: {CBDD5F7D-945B-4CF0-9E33-CF07D6CD2F12} - \RealUpgradeScheduledTaskS-1-5-21-2015888278-3637765471-366299829-1001 No Task File <==== ATTENTION
Task: {CC03C2EB-27F1-42FC-BD43-3267C6F20BCA} - \{FE10ED0B-1BE9-4158-ADD7-BD7F4E9580B8} No Task File <==== ATTENTION
Task: {F72F899F-B0BC-4093-9B00-9EDE5B10665A} - \{36111CFD-CF36-43C1-8AE8-A5DEB3779B61} No Task File <==== ATTENTION
Task: {F8F90DB2-3F30-42A9-85AD-5F99165F5869} - \{C4FF0E94-B7DD-4B11-A18B-F35437A1E14D} No Task File <==== ATTENTION
AlternateDataStreams: C:\ProgramData\TEMP:D9FA218A
*****************


=========  taskkill /f /im dllhost.exe =========

SUCCESS: The process "dllhost.exe" with PID 4428 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 4668 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 8240 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 14080 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 18136 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 4236 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 10096 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 13588 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 13852 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 6596 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 7012 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 2172 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 3920 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 7200 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 9140 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 14736 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 11276 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 15268 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 6652 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 15848 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 5328 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 14656 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 9692 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 13348 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 8956 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 7680 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 6260 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 15420 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 13264 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 5436 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 15876 has been terminated.
SUCCESS: The process "dllhost.exe" with PID 7540 has been terminated.

========= End of CMD: =========

[18112] C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe => Process closed successfully.
[6580] C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe => Process closed successfully.
[12712] C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe => Process closed successfully.
[7088] C:\Users\Dan\AppData\Roaming\Coicbey\etefz.exe => Process closed successfully.
HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\\AvgUninstallURL => value deleted successfully.
HKLM => Group Policy Restriction on software restored successfully.
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\Software\Microsoft\Windows\CurrentVersion\Run\\Bitberry => value deleted successfully.
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\Software\Microsoft\Windows\CurrentVersion\Run\\Totayvizdaqoi => value deleted successfully.
"HKU\S-1-5-21-2015888278-3637765471-366299829-1001\Software\Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}" => Key deleted successfully.
"HKU\S-1-5-21-2015888278-3637765471-366299829-1001\Software\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32" => Key deleted successfully.
"HKU\S-1-5-21-2015888278-3637765471-366299829-1001\Software\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}" => Key deleted successfully.
C:\Users\Dan\AppData\Roaming\Coicbey => Moved successfully.

"C:\Users\Dan\AppData\Roaming\bssbdgdt" directory move:

C:\Users\Dan\AppData\Roaming\bssbdgdt\bssbdgdt => Moved successfully.
Could not move "C:\Users\Dan\AppData\Roaming\bssbdgdt\etvuetvw.exe" => Scheduled to move on reboot.
Could not move "C:\Users\Dan\AppData\Roaming\bssbdgdt" directory. => Scheduled to move on reboot.

C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8} => Moved successfully.
C:\Users\Dan\Desktop\Yahtzee.dat => Moved successfully.
C:\Users\Dan\Desktop\hi.dat => Moved successfully.
C:\$Recycle.Bin\S-1-5-21-2015888278-3637765471-366299829-1001\$7d049a04e11b896b2a9dfd255201f599 => Moved successfully.
C:\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599 => Moved successfully.
Winsock: Catalog5 entry 000000000001\\LibraryPath  was set successfully to %SystemRoot%\system32\NLAapi.dll
Winsock: Catalog5 entry 000000000009\\LibraryPath  was set successfully to %SystemRoot%\System32\mswsock.dll
Winsock: Catalog5-x64 entry 000000000001\\LibraryPath  was set successfully to %SystemRoot%\system32\NLAapi.dll
Winsock: Catalog5-x64 entry 000000000009\\LibraryPath  was set successfully to %SystemRoot%\System32\mswsock.dll

=========  netsh winsock reset =========


Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.


========= End of CMD: =========

C:\Users\Dan\AppData\Local\Temp\AdobeUpdater12345.exe => Moved successfully.
C:\Users\Dan\AppData\Local\Temp\conhost.exe => Moved successfully.
C:\Users\Dan\AppData\Local\Temp\e.dll => Moved successfully.
C:\Users\Dan\AppData\Local\Temp\fvJcrgR.exe => Moved successfully.
C:\Users\Dan\AppData\Local\Temp\InstallFlashPlayer.exe => Moved successfully.
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_140cf8a4.exe => Moved successfully.
Could not move "C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_7004b633.exe" => Scheduled to move on reboot.
C:\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_b3113484.exe => Moved successfully.
C:\Users\Dan\AppData\Local\Temp\{F72FF6B1-02E0-472F-8CFD-A9D7DACDD19A}.exe => Moved successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{168BECB9-FB5B-45BF-BAD9-9B370CF2AA8A}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{168BECB9-FB5B-45BF-BAD9-9B370CF2AA8A}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\GoogleUpdateTaskMachineUA" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{39690FFC-6767-4D0D-A335-C01854FFC30D}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{39690FFC-6767-4D0D-A335-C01854FFC30D}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{157D9429-F7A2-4729-93E5-9109E157DDEC}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{56F4C9B6-E49D-4C1D-AA86-7F2D50DA6BDC}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{56F4C9B6-E49D-4C1D-AA86-7F2D50DA6BDC}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\RealUpgradeLogonTaskS-1-5-21-2015888278-3637765471-366299829-1001" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{629D3E9F-5C26-409F-9229-D07F73E0B3C4}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{629D3E9F-5C26-409F-9229-D07F73E0B3C4}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\GoogleUpdateTaskMachineCore" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{716930D6-FCE7-4716-B126-1A14FE6E4642}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{716930D6-FCE7-4716-B126-1A14FE6E4642}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Adobe Flash Player Updater" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{CBDD5F7D-945B-4CF0-9E33-CF07D6CD2F12}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{CBDD5F7D-945B-4CF0-9E33-CF07D6CD2F12}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\RealUpgradeScheduledTaskS-1-5-21-2015888278-3637765471-366299829-1001" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{CC03C2EB-27F1-42FC-BD43-3267C6F20BCA}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{CC03C2EB-27F1-42FC-BD43-3267C6F20BCA}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{FE10ED0B-1BE9-4158-ADD7-BD7F4E9580B8}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{F72F899F-B0BC-4093-9B00-9EDE5B10665A}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F72F899F-B0BC-4093-9B00-9EDE5B10665A}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{36111CFD-CF36-43C1-8AE8-A5DEB3779B61}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{F8F90DB2-3F30-42A9-85AD-5F99165F5869}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F8F90DB2-3F30-42A9-85AD-5F99165F5869}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{C4FF0E94-B7DD-4B11-A18B-F35437A1E14D}" => Key deleted successfully.
C:\ProgramData\TEMP => ":D9FA218A" ADS removed successfully.

 

 

 

 

 

 

 

 

 

# AdwCleaner v3.308 - Report created 27/08/2014 at 23:52:46
# Updated 20/08/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Dan - SUPERNEWT
# Running from : C:\Users\Dan\Downloads\AdwCleaner(1).exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****

File Found : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_search.babylon.com_0.localstorage
File Found : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_search.babylon.com_0.localstorage-journal
File Found : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\Extensions\ftdownloader@ftdownloader.com.xpi
File Found : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\user.js
Folder Found : C:\Program Files (x86)\Conduit
Folder Found : C:\Program Files (x86)\FunWebProducts
Folder Found : C:\Program Files (x86)\Yontoo
Folder Found : C:\ProgramData\Babylon
Folder Found : C:\ProgramData\Browser Manager
Folder Found : C:\ProgramData\Tarma Installer
Folder Found : C:\ProgramData\wincert
Folder Found : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh
Folder Found : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk
Folder Found : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli
Folder Found : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc
Folder Found : C:\Users\Dan\AppData\Local\Ilivid Player
Folder Found : C:\Users\Dan\AppData\Local\PutLockerDownloader
Folder Found : C:\Users\Dan\AppData\LocalLow\Conduit
Folder Found : C:\Users\Dan\AppData\LocalLow\DataMngr
Folder Found : C:\Users\Dan\AppData\LocalLow\Freecorder
Folder Found : C:\Users\Dan\AppData\LocalLow\Funmoods
Folder Found : C:\Users\Dan\AppData\Roaming\Babylon
Folder Found : C:\Users\Dan\AppData\Roaming\Funmoods
Folder Found : C:\Users\Dan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\FTDownloader.com
Folder Found : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\Extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
Folder Found : C:\Windows\Freecorder

***** [ Scheduled Tasks ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\AppDataLow\Software\Conduit
Key Found : HKCU\Software\AppDataLow\Software\Freecorder
Key Found : HKCU\Software\AppDataLow\Toolbar
Key Found : HKCU\Software\Ask&Record
Key Found : HKCU\Software\AutocompleteProBHO
Key Found : HKCU\Software\Conduit
Key Found : HKCU\Software\DataMngr
Key Found : HKCU\Software\DataMngr_Toolbar
Key Found : HKCU\Software\InstallCore
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{0FB6A909-6086-458F-BD92-1F8EE10042A0}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{1392B8D2-5C05-419F-A8F6-B9F15A596612}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0FB6A909-6086-458F-BD92-1F8EE10042A0}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Found : HKCU\Software\SweetIM
Key Found : HKCU\Software\YahooPartnerToolbar
Key Found : [x64] HKCU\Software\Ask&Record
Key Found : [x64] HKCU\Software\AutocompleteProBHO
Key Found : [x64] HKCU\Software\Conduit
Key Found : [x64] HKCU\Software\DataMngr
Key Found : [x64] HKCU\Software\DataMngr_Toolbar
Key Found : [x64] HKCU\Software\InstallCore
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Found : [x64] HKCU\Software\SweetIM
Key Found : [x64] HKCU\Software\YahooPartnerToolbar
Key Found : HKLM\SOFTWARE\Babylon
Key Found : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
Key Found : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Found : HKLM\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}
Key Found : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Found : HKLM\SOFTWARE\Classes\AppID\YontooIEClient.DLL
Key Found : HKLM\SOFTWARE\Classes\Applications\ilividsetup.exe
Key Found : HKLM\SOFTWARE\Classes\Applications\ilividsetupv1.exe
Key Found : HKLM\SOFTWARE\Classes\bbylntlbr.bbylntlbrHlpr
Key Found : HKLM\SOFTWARE\Classes\bbylntlbr.bbylntlbrHlpr.1
Key Found : HKLM\SOFTWARE\Classes\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{99066096-8989-4612-841F-621A01D54AD7}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93}
Key Found : HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Found : HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}
Key Found : HKLM\SOFTWARE\Classes\Prod.cap
Key Found : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Found : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}
Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Api
Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Api.1
Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Layers
Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Layers.1
Key Found : HKLM\SOFTWARE\Conduit
Key Found : HKLM\SOFTWARE\Freecorder
Key Found : HKLM\SOFTWARE\Freeze.com
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\niapdbllcanepiiimjjndipklodoedlc
Key Found : HKLM\SOFTWARE\iLividSRTB
Key Found : HKLM\SOFTWARE\Iminent
Key Found : HKLM\SOFTWARE\Informer Technologies, Inc.\OpenCandy
Key Found : HKLM\SOFTWARE\InstallCore
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{74F475FA-6C75-43BD-AAB9-ECDA6184F600}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\au__rasapi32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\au__rasmancs
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\datamngrUI_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\datamngrUI_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\iLividMediaBar_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\iLividMediaBar_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetup_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetup_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetupV1_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetupV1_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\SearchquMediaBar_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\SearchquMediaBar_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\SetupDataMngr_Searchqu_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\SetupDataMngr_Searchqu_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\UpdateTask_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\UpdateTask_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\wajamupdater_rasapi32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\wajamupdater_rasmancs
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1CB53449-A2B6-4324-8E0C-55813A88AD70}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Results Toolbar
Key Found : HKLM\SOFTWARE\SweetIM
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}
Key Found : [x64] HKLM\SOFTWARE\DataMngr
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\08121C32A9C319F4CB0C11FF059552A4
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Funmoods
Key Found : [x64] HKLM\SOFTWARE\Tarma Installer

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16448

Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://searchfunmoods.com/?f=1&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://searchfunmoods.com/?f=1&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057

-\\ Mozilla Firefox v31.0 (x86 en-US)

[ File : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\prefs.js ]

Line Found : user_pref("browser.babylon.HPOnNewTab", "search.babylon.com");
Line Found : user_pref("browser.search.defaultenginename", "Search the web (Babylon)");
Line Found : user_pref("browser.search.order.1", "Search the web (Babylon)");
Line Found : user_pref("browser.search.selectedEngine", "Search the web (Babylon)");
Line Found : user_pref("browser.startup.homepage", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f");
Line Found : user_pref("extensions.BabylonToolbar_i.aflt", "babsst");
Line Found : user_pref("extensions.BabylonToolbar_i.babExt", "");
Line Found : user_pref("extensions.BabylonToolbar_i.babTrack", "affID=109935&tt=060612_6_");
Line Found : user_pref("extensions.BabylonToolbar_i.hardId", "4ced4cef000000000000002618e0b15f");
Line Found : user_pref("extensions.BabylonToolbar_i.id", "4ced4cef000000000000002618e0b15f");
Line Found : user_pref("extensions.BabylonToolbar_i.instlDay", "15508");
Line Found : user_pref("extensions.BabylonToolbar_i.instlRef", "sst");
Line Found : user_pref("extensions.BabylonToolbar_i.newTab", true);
Line Found : user_pref("extensions.BabylonToolbar_i.newTabUrl", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=NT_ss&mntrId=4ced4cef000000000000002618e0b15f");
Line Found : user_pref("extensions.BabylonToolbar_i.prdct", "BabylonToolbar");
Line Found : user_pref("extensions.BabylonToolbar_i.prtnrId", "babylon");
Line Found : user_pref("extensions.BabylonToolbar_i.smplGrp", "none");
Line Found : user_pref("extensions.BabylonToolbar_i.srcExt", "ss");
Line Found : user_pref("extensions.BabylonToolbar_i.tlbrId", "tb9");
Line Found : user_pref("extensions.BabylonToolbar_i.vrsn", "1.5.3.17");
Line Found : user_pref("extensions.BabylonToolbar_i.vrsnTs", "1.5.3.1713:19:46");
Line Found : user_pref("extensions.BabylonToolbar_i.vrsni", "1.5.3.17");
Line Found : user_pref("keyword.URL", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=KW_ss&mntrId=4ced4cef000000000000002618e0b15f&q=");

-\\ Google Chrome v36.0.1985.143

[ File : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\preferences ]

Found [Search Provider] : hxxp://dts.search-results.com/sr?src=crb&appid=283&systemid=406&sr=0&q={searchTerms}
Found [Search Provider] : hxxp://dts.search-results.com/sr?src=crb&gct=ds&appid=260&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&o=APN10645&apn_uid=2351152231044850&q={searchTerms}
Found [Search Provider] : hxxp://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
Found [Homepage] : hxxp://www.searchnu.com/406
Found [Extension] : bbjciahceamgodcoidkjpchnokgfpphh
Found [Extension] : defdhglnppeioeflggkmglipcecffkhk
Found [Extension] : gkjoindjjcmbdpbfppabdgflnkgbbcli
Found [Extension] : niapdbllcanepiiimjjndipklodoedlc

*************************

AdwCleaner[R0].txt - [16227 octets] - [27/08/2014 23:52:46]

########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [16288 octets] ##########
 

 

 


Edited by Fell, 27 August 2014 - 11:58 PM.


#8 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 28 August 2014 - 06:33 AM

Hi Fell,
 
Double click on AdwCleaner.exe to run the tool again.

  • Click on the Scan button.
  • AdwCleaner will begin to scan your computer like it did before.
  • After the scan has finished.
  • This time click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S#].txt) will open automatically (where the largest value of # represents the most recent report).
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.

--------------
 
Please re-run FRST from the desktop (like you did before) and press the scan button. It will produce a FRST.txt log located on the desktop. Please copy and paste the log into your next reply.

--------------
 
To recap, in your next reply I would like to see the following. Make sure to copy & paste them unless I ask otherwise:

  • AdwCleaner clean log
  • New FRST.txt

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#9 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 28 August 2014 - 07:23 AM

# AdwCleaner v3.308 - Report created 28/08/2014 at 07:05:56
# Updated 20/08/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Dan - SUPERNEWT
# Running from : C:\Users\Dan\Downloads\AdwCleaner(1).exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Deleted : C:\ProgramData\Babylon
[#] Folder Deleted : C:\ProgramData\Browser Manager
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\ProgramData\wincert
Folder Deleted : C:\Program Files (x86)\Conduit
Folder Deleted : C:\Program Files (x86)\FunWebProducts
Folder Deleted : C:\Program Files (x86)\Yontoo
Folder Deleted : C:\Windows\Freecorder
Folder Deleted : C:\Users\Dan\AppData\Local\Ilivid Player
Folder Deleted : C:\Users\Dan\AppData\Local\PutLockerDownloader
Folder Deleted : C:\Users\Dan\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\Dan\AppData\LocalLow\DataMngr
Folder Deleted : C:\Users\Dan\AppData\LocalLow\Funmoods
Folder Deleted : C:\Users\Dan\AppData\LocalLow\Freecorder
Folder Deleted : C:\Users\Dan\AppData\Roaming\Babylon
Folder Deleted : C:\Users\Dan\AppData\Roaming\Funmoods
Folder Deleted : C:\Users\Dan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\FTDownloader.com
Folder Deleted : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\Extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
Folder Deleted : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh
Folder Deleted : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk
Folder Deleted : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli
Folder Deleted : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc
File Deleted : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\Extensions\ftdownloader@ftdownloader.com.xpi
File Deleted : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\user.js
File Deleted : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_search.babylon.com_0.localstorage
File Deleted : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_search.babylon.com_0.localstorage-journal

***** [ Scheduled Tasks ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\niapdbllcanepiiimjjndipklodoedlc
Key Deleted : HKLM\SOFTWARE\Classes\AppID\YontooIEClient.DLL
Key Deleted : HKLM\SOFTWARE\Classes\Applications\ilividsetup.exe
Key Deleted : HKLM\SOFTWARE\Classes\Applications\ilividsetupv1.exe
Key Deleted : HKLM\SOFTWARE\Classes\bbylntlbr.bbylntlbrHlpr
Key Deleted : HKLM\SOFTWARE\Classes\bbylntlbr.bbylntlbrHlpr.1
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Api
Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Api.1
Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Layers
Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Layers.1
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{74F475FA-6C75-43BD-AAB9-ECDA6184F600}
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\au__rasapi32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\au__rasmancs
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\datamngrUI_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\datamngrUI_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividMediaBar_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividMediaBar_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetup_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetup_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetupV1_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetupV1_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SearchquMediaBar_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SearchquMediaBar_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SetupDataMngr_Searchqu_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SetupDataMngr_Searchqu_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\UpdateTask_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\UpdateTask_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\wajamupdater_rasapi32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\wajamupdater_rasmancs
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{99066096-8989-4612-841F-621A01D54AD7}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0FB6A909-6086-458F-BD92-1F8EE10042A0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{0FB6A909-6086-458F-BD92-1F8EE10042A0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{1392B8D2-5C05-419F-A8F6-B9F15A596612}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1CB53449-A2B6-4324-8E0C-55813A88AD70}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F34C9277-6577-4DFF-B2D7-7D58092F272F}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
Key Deleted : HKCU\Software\Ask&Record
Key Deleted : HKCU\Software\AutocompleteProBHO
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\DataMngr_Toolbar
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\SweetIM
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKCU\Software\AppDataLow\Toolbar
Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\Freecorder
Key Deleted : HKLM\SOFTWARE\Babylon
Key Deleted : HKLM\SOFTWARE\Conduit
Key Deleted : HKLM\SOFTWARE\Freeze.com
Key Deleted : HKLM\SOFTWARE\iLividSRTB
Key Deleted : HKLM\SOFTWARE\Iminent
Key Deleted : HKLM\SOFTWARE\Informer Technologies, Inc.\OpenCandy
Key Deleted : HKLM\SOFTWARE\InstallCore
Key Deleted : HKLM\SOFTWARE\SweetIM
Key Deleted : HKLM\SOFTWARE\Freecorder
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Results Toolbar
Key Deleted : [x64] HKLM\SOFTWARE\DataMngr
Key Deleted : [x64] HKLM\SOFTWARE\Tarma Installer
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Funmoods
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\08121C32A9C319F4CB0C11FF059552A4

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16448

Setting Restored : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page]
Setting Restored : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page]

-\\ Mozilla Firefox v31.0 (x86 en-US)

[ File : C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default\prefs.js ]

Line Deleted : user_pref("browser.babylon.HPOnNewTab", "search.babylon.com");
Line Deleted : user_pref("browser.search.defaultenginename", "Search the web (Babylon)");
Line Deleted : user_pref("browser.search.order.1", "Search the web (Babylon)");
Line Deleted : user_pref("browser.search.selectedEngine", "Search the web (Babylon)");
Line Deleted : user_pref("browser.startup.homepage", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f");
Line Deleted : user_pref("extensions.BabylonToolbar_i.aflt", "babsst");
Line Deleted : user_pref("extensions.BabylonToolbar_i.babExt", "");
Line Deleted : user_pref("extensions.BabylonToolbar_i.babTrack", "affID=109935&tt=060612_6_");
Line Deleted : user_pref("extensions.BabylonToolbar_i.hardId", "4ced4cef000000000000002618e0b15f");
Line Deleted : user_pref("extensions.BabylonToolbar_i.id", "4ced4cef000000000000002618e0b15f");
Line Deleted : user_pref("extensions.BabylonToolbar_i.instlDay", "15508");
Line Deleted : user_pref("extensions.BabylonToolbar_i.instlRef", "sst");
Line Deleted : user_pref("extensions.BabylonToolbar_i.newTab", true);
Line Deleted : user_pref("extensions.BabylonToolbar_i.newTabUrl", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=NT_ss&mntrId=4ced4cef000000000000002618e0b15f");
Line Deleted : user_pref("extensions.BabylonToolbar_i.prdct", "BabylonToolbar");
Line Deleted : user_pref("extensions.BabylonToolbar_i.prtnrId", "babylon");
Line Deleted : user_pref("extensions.BabylonToolbar_i.smplGrp", "none");
Line Deleted : user_pref("extensions.BabylonToolbar_i.srcExt", "ss");
Line Deleted : user_pref("extensions.BabylonToolbar_i.tlbrId", "tb9");
Line Deleted : user_pref("extensions.BabylonToolbar_i.vrsn", "1.5.3.17");
Line Deleted : user_pref("extensions.BabylonToolbar_i.vrsnTs", "1.5.3.1713:19:46");
Line Deleted : user_pref("extensions.BabylonToolbar_i.vrsni", "1.5.3.17");
Line Deleted : user_pref("keyword.URL", "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=KW_ss&mntrId=4ced4cef000000000000002618e0b15f&q=");

-\\ Google Chrome v36.0.1985.143

[ File : C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\preferences ]

Deleted [Search Provider] : hxxp://dts.search-results.com/sr?src=crb&appid=283&systemid=406&sr=0&q={searchTerms}
Deleted [Search Provider] : hxxp://dts.search-results.com/sr?src=crb&gct=ds&appid=260&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&o=APN10645&apn_uid=2351152231044850&q={searchTerms}
Deleted [Search Provider] : hxxp://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
Deleted [Homepage] : hxxp://www.searchnu.com/406
Deleted [Extension] : bbjciahceamgodcoidkjpchnokgfpphh
Deleted [Extension] : defdhglnppeioeflggkmglipcecffkhk
Deleted [Extension] : gkjoindjjcmbdpbfppabdgflnkgbbcli
Deleted [Extension] : niapdbllcanepiiimjjndipklodoedlc

*************************

AdwCleaner[R0].txt - [16461 octets] - [27/08/2014 23:52:46]
AdwCleaner[S0].txt - [15569 octets] - [28/08/2014 07:05:56]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [15630 octets] ##########

 

 

 

 

 

 

 

 

 

 

 

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 25-08-2014
Ran by Dan (administrator) on SUPERNEWT on 28-08-2014 07:20:56
Running from C:\Users\Dan\Desktop
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: English (United States)
Internet Explorer Version 9
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Microsoft Corporation) C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe
(Microsoft Corporation) C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe
() C:\Program Files (x86)\ASUS\EPU-4 Engine\FourEngine.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Security Protection\PSANHost.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Devices Agent\AgentSvc.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAService.exe
(Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
() C:\Program Files\LTONHIS\Touch Manager\SKDaemon.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Microsoft Corporation) C:\Program Files\Microsoft Xbox 360 Accessories\XBoxStat.exe
(Microsoft Corporation) C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
(Broadcom Corporation.) C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
(RealNetworks, Inc.) C:\Program Files (x86)\Real\RealPlayer\Update\realsched.exe
(Sun Microsystems, Inc.) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(Apple Inc.) C:\Program Files (x86)\iTunes\iTunesHelper.exe
(Panda Security, S.L.) C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAMain.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
(Adobe Systems, Inc.) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_14_0_0_179.exe
(Adobe Systems, Inc.) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_14_0_0_179.exe
(Microsoft Corporation) C:\Windows\System32\prevhost.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [SKDaemon.exe] => C:\Program Files\LTONHIS\Touch Manager\SKDaemon.exe [318464 2009-06-16] ()
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [7833120 2009-05-22] (Realtek Semiconductor)
HKLM\...\Run: [Skytel] => C:\Program Files\Realtek\Audio\HDA\Skytel.exe [1833504 2009-05-22] (Realtek Semiconductor Corp.)
HKLM\...\Run: [XboxStat] => C:\Program Files\Microsoft Xbox 360 Accessories\XboxStat.exe [825184 2009-09-30] (Microsoft Corporation)
HKLM-x32\...\Run: [Microsoft Default Manager] => C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe [439568 2010-05-10] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] => C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [43816 2014-07-31] (Apple Inc.)
HKLM-x32\...\Run: [TkBellExe] => c:\program files (x86)\real\realplayer\Update\realsched.exe [296056 2012-05-29] (RealNetworks, Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [252848 2012-07-03] (Sun Microsystems, Inc.)
HKLM-x32\...\Run: [QuickTime Task] => C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2014-01-17] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] => C:\Program Files (x86)\iTunes\iTunesHelper.exe [152392 2014-08-01] (Apple Inc.)
HKLM-x32\...\Run: [PSUAMain] => C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAMain.exe [37624 2014-07-24] (Panda Security, S.L.)
HKLM\...\Winlogon: [Userinit] C:\Windows\SysWOW64\userinit.exe,
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [msnmsgr] => C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe [3872080 2010-04-16] (Microsoft Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [Steam] => C:\Program Files (x86)\Steam\Steam.exe [1937600 2014-08-13] (Valve Corporation)
HKU\S-1-5-21-2015888278-3637765471-366299829-1001\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2011-10-12] (Google Inc.)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Bluetooth.lnk
ShortcutTarget: Bluetooth.lnk -> C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe (Broadcom Corporation.)

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
BHO: Windows Live Family Safety Browser Helper Class -> {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} -> C:\Program Files\Windows Live\Family Safety\fssbho.dll (Microsoft Corporation)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation)
BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
BHO: Skype Click to Call for Internet Explorer -> {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} -> C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll (Microsoft Corporation)
BHO: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre6\bin\jp2ssv.dll (Sun Microsystems, Inc.)
BHO-x32: RealPlayer Download and Record Plugin for Internet Explorer -> {3049C3E9-B461-4BC5-8870-4C09146192CA} -> C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll (RealPlayer)
BHO-x32: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} ->  No File
BHO-x32: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation)
BHO-x32: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO-x32: Skype Click to Call for Internet Explorer -> {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} -> C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll (Microsoft Corporation)
BHO-x32: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKCU - No Name - {21FA44EF-376D-4D53-9B0F-8A89D3229068} -  No File
Toolbar: HKCU - Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
DPF: HKLM-x32 {A8F2B9BD-A6A0-486A-9744-18920D898429} http://www.sibelius.com/download/software/win/ActiveXPlugin.cab
DPF: HKLM-x32 {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Handler: skypec2c - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll (Microsoft Corporation)
Handler-x32: skypec2c - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll (Microsoft Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1

FireFox:
========
FF ProfilePath: C:\Users\Dan\AppData\Roaming\Mozilla\Firefox\Profiles\wfmhgh81.default
FF NetworkProxy: "no_proxies_on", "*.local"
FF NetworkProxy: "type", 0
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF64_14_0_0_179.dll ()
FF Plugin: @java.com/JavaPlugin -> C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_14_0_0_179.dll ()
FF Plugin-x32: @Apple.com/iTunes,version=1.0 -> C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll ()
FF Plugin-x32: @java.com/DTPlugin,version=10.17.2 -> C:\Windows\SysWOW64\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.17.2 -> C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/OfficeLive,version=1.5 -> C:\Program Files (x86)\Microsoft\Office Live\npOLW.dll (Microsoft Corp.)
FF Plugin-x32: @microsoft.com/WLPG,version=14.0.8064.0206 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll No File
FF Plugin-x32: @real.com/nppl3260;version=15.0.4.53 -> c:\program files (x86)\real\realplayer\Netscape6\nppl3260.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprjplug;version=15.0.4.53 -> c:\program files (x86)\real\realplayer\Netscape6\nprjplug.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprpchromebrowserrecordext;version=15.0.4.53 -> C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprpchromebrowserrecordext.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprphtml5videoshim;version=15.0.4.53 -> C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll (RealNetworks, Inc.)
FF Plugin-x32: @real.com/nprpplugin;version=15.0.4.53 -> c:\program files (x86)\real\realplayer\Netscape6\nprpplugin.dll (RealPlayer)
FF Plugin-x32: @tools.google.com/Google Update;version=3 -> C:\Program Files (x86)\Google\Update\1.3.24.15\npGoogleUpdate3.dll (Google Inc.)
FF Plugin-x32: @tools.google.com/Google Update;version=9 -> C:\Program Files (x86)\Google\Update\1.3.24.15\npGoogleUpdate3.dll (Google Inc.)
FF Extension: Skype Click to Call - C:\Program Files (x86)\Mozilla Firefox\browser\extensions\{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}.xpi [2014-08-24]
FF HKLM-x32\...\Firefox\Extensions: [{3252b9ae-c69a-4eaf-9502-dc9c1f6c009e}] - C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DMExtension
FF Extension: Default Manager - C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DMExtension [2011-01-26]
FF HKLM-x32\...\Firefox\Extensions: [{97E22097-9A2F-45b1-8DAF-36AD648C7EF4}] - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext
FF Extension: RealPlayer Browser Record Plugin - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext [2011-10-28]

Chrome:
=======
CHR HomePage: Default -> hxxp://www.google.com/
CHR RestoreOnStartup: Default -> "hxxp://www.searchnu.com/406",
            "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f",
            "hxxp://www.google.com"
CHR NewTab: Default -> "chrome-extension://oocaehgghkpmfmafjenhhnkbfdjjbkic/config/skin/new-tab.html"
CHR DefaultSearchKeyword: Default -> funmoods.com
CHR DefaultSearchProvider: Default -> Funmoods
CHR DefaultSearchURL: Default -> http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
CHR DefaultSuggestURL: Default -> {google:baseSuggestURL}search?client=chrome&hl={language}&q={searchTerms}
CHR Plugin: (Remoting Viewer) - internal-remoting-viewer
CHR Plugin: (Native Client) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\ppGoogleNaClPluginChrome.dll No File
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\pdf.dll No File
CHR Plugin: (Shockwave Flash) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\gcswf32.dll No File
CHR Plugin: (Shockwave Flash) - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_3_300_257.dll No File
CHR Plugin: (Adobe Acrobat) - C:\Program Files (x86)\Adobe\Reader 8.0\Reader\Browser\nppdf32.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin2.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin3.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin4.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin5.dll (Apple Inc.)
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll No File
CHR Plugin: (Google Update) - C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll No File
CHR Plugin: (Silverlight Plug-In) - C:\Program Files (x86)\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation)
CHR Plugin: (Microsoft Office Live Plug-in for Firefox) - C:\Program Files (x86)\Microsoft\Office Live\npOLW.dll (Microsoft Corp.)
CHR Plugin: (Java Deployment Toolkit 7.0.50.255) - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
CHR Plugin: (Java™ Platform SE 7 U5) - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\plugin2\npjp2.dll (Oracle Corporation)
CHR Plugin: (Pando Web Plugin) - C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll No File
CHR Plugin: (Windows Live® Photo Gallery) - C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
CHR Plugin: (iTunes Application Detector) - C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll ()
CHR Plugin: (RealNetworks™ Chrome Background Extension Plug-In (32-bit) ) - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprpchromebrowserrecordext.dll (RealNetworks, Inc.)
CHR Plugin: (RealPlayer™ HTML5VideoShim Plug-In (32-bit) ) - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll (RealNetworks, Inc.)
CHR Plugin: (RealPlayer™ G2 LiveConnect-Enabled Plug-In (32-bit) ) - c:\program files (x86)\real\realplayer\Netscape6\nppl3260.dll (RealNetworks, Inc.)
CHR Plugin: (RealPlayer Download Plugin) - c:\program files (x86)\real\realplayer\Netscape6\nprpplugin.dll (RealPlayer)
CHR Plugin: (RealJukebox NS Plugin) - c:\program files (x86)\real\realplayer\Netscape6\nprjplug.dll (RealNetworks, Inc.)
CHR Profile: C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh [2002-01-01]
CHR Extension: (YouTube) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2012-06-17]
CHR Extension: (Google Search) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2012-06-17]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk [2012-06-17]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli [2002-01-01]
CHR Extension: (RealPlayer HTML5Video Downloader Extension) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfmjfhklogoienhpfnppmbcbjfjnkonk [2012-06-17]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc [2002-01-01]
CHR Extension: (Gmail) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2012-06-17]
CHR HKLM-x32\...\Chrome\Extension: [jfmjfhklogoienhpfnppmbcbjfjnkonk] - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Chrome\Ext\rphtml5video.crx [2011-10-28]
CHR HKLM-x32\...\Chrome\Extension: [lifbcibllhkdhoafpjfnlhfpfgnpldfl] - C:\Program Files (x86)\Skype\Toolbars\ChromeExtension\skype_chrome_extension.crx [2014-07-14]

==================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 c2cautoupdatesvc; C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe [1390176 2014-07-14] (Microsoft Corporation)
R2 c2cpnrsvc; C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe [1767520 2014-07-14] (Microsoft Corporation)
R2 NanoServiceMain; C:\Program Files (x86)\Panda Security\Panda Security Protection\PSANHost.exe [141560 2014-07-24] (Panda Security, S.L.)
R2 PandaAgent; C:\Program Files (x86)\Panda Security\Panda Devices Agent\AgentSvc.exe [61688 2014-07-23] (Panda Security, S.L.)
R2 PSUAService; C:\Program Files (x86)\Panda Security\Panda Security Protection\PSUAService.exe [38136 2014-07-24] (Panda Security, S.L.)

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 ASInsHelp; C:\Windows\SysWow64\drivers\AsInsHelp64.sys [11832 2008-01-04] ()
R1 AsIO; C:\Windows\SysWow64\drivers\AsIO.sys [13440 2009-08-03] ()
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [15416 2009-07-15] ()
R1 NNSALPC; C:\Windows\System32\DRIVERS\NNSAlpc.sys [96800 2014-06-04] (Panda Security, S.L.)
R1 NNSHTTP; C:\Windows\System32\DRIVERS\NNSHttp.sys [162336 2014-06-18] (Panda Security, S.L.)
R1 NNSHTTPS; C:\Windows\System32\DRIVERS\NNSHttps.sys [112160 2014-06-04] (Panda Security, S.L.)
R1 NNSIDS; C:\Windows\System32\DRIVERS\NNSIds.sys [115232 2014-06-04] (Panda Security, S.L.)
R1 NNSNAHSL; C:\Windows\System32\DRIVERS\NNSNAHSL.sys [46336 2014-01-16] (Panda Security, S.L.)
R1 NNSPICC; C:\Windows\System32\DRIVERS\NNSPicc.sys [95776 2014-06-04] (Panda Security, S.L.)
R1 NNSPIHSW; C:\Windows\System32\DRIVERS\NNSPihsw.sys [70176 2014-06-04] (Panda Security, S.L.)
R1 NNSPOP3; C:\Windows\System32\DRIVERS\NNSPop3.sys [125984 2014-06-04] (Panda Security, S.L.)
R1 NNSPROT; C:\Windows\System32\DRIVERS\NNSProt.sys [306720 2014-06-04] (Panda Security, S.L.)
R1 NNSPRV; C:\Windows\System32\DRIVERS\NNSPrv.sys [169504 2014-06-04] (Panda Security, S.L.)
R1 NNSSMTP; C:\Windows\System32\DRIVERS\NNSSmtp.sys [115744 2014-06-04] (Panda Security, S.L.)
R1 NNSSTRM; C:\Windows\System32\DRIVERS\NNSStrm.sys [261152 2014-06-04] (Panda Security, S.L.)
R1 NNSTLSC; C:\Windows\System32\DRIVERS\NNSTlsc.sys [109088 2014-06-04] (Panda Security, S.L.)
R2 PSINAflt; C:\Windows\System32\DRIVERS\PSINAflt.sys [160800 2014-07-24] (Panda Security, S.L.)
R2 PSINFile; C:\Windows\System32\DRIVERS\PSINFile.sys [120352 2014-07-24] (Panda Security, S.L.)
R1 PSINKNC; C:\Windows\System32\DRIVERS\psinknc.sys [195616 2014-07-24] (Panda Security, S.L.)
R2 PSINProc; C:\Windows\System32\DRIVERS\PSINProc.sys [122400 2014-07-24] (Panda Security, S.L.)
R2 PSINProt; C:\Windows\System32\DRIVERS\PSINProt.sys [132128 2014-07-24] (Panda Security, S.L.)
R2 PSINReg; C:\Windows\System32\DRIVERS\PSINReg.sys [106016 2014-07-24] (Panda Security, S.L.)
R3 PSKMAD; C:\Windows\System32\DRIVERS\PSKMAD.sys [60400 2014-03-25] (Panda Security, S.L.)
R1 Serial; C:\Windows\System32\DRIVERS\serial.sys [94208 2009-07-13] (Brother Industries Ltd.)
U3 TrueSight; C:\Windows\SysWOW64\drivers\TrueSight.sys [33512 2014-08-25] ()

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)


==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-08-28 07:20 - 2014-08-28 07:20 - 00021697 _____ () C:\Users\Dan\Desktop\FRST.txt
2014-08-28 07:17 - 2014-08-28 07:17 - 02103296 _____ (Farbar) C:\Users\Dan\Desktop\FRST64.exe
2014-08-28 00:11 - 2014-08-28 00:32 - 00000022 _____ () C:\Users\Dan\Desktop\Yahtzee.dat
2014-08-28 00:11 - 2014-08-28 00:25 - 00000145 _____ () C:\Users\Dan\Desktop\hi.dat
2014-08-27 23:53 - 2010-08-30 08:34 - 00536576 _____ (SQLite Development Team) C:\Windows\SysWOW64\sqlite3.dll
2014-08-27 23:52 - 2014-08-28 07:06 - 00000000 ____D () C:\AdwCleaner
2014-08-27 23:47 - 2014-08-27 23:47 - 01364531 _____ () C:\Users\Dan\Downloads\AdwCleaner(1).exe
2014-08-27 23:26 - 2014-08-27 23:30 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Coicbey
2014-08-27 23:24 - 2014-08-27 23:47 - 00000347 _____ () C:\Users\Dan\Downloads\AdwCleaner.exe
2014-08-27 16:17 - 2014-08-27 16:17 - 00000915 _____ () C:\Users\Dan\Desktop\Revo Uninstaller.lnk
2014-08-27 16:16 - 2014-08-27 16:17 - 00000000 ____D () C:\Users\Dan\Desktop\revounistanller
2014-08-27 16:13 - 2014-08-27 16:13 - 02623656 _____ (VS Revo Group Ltd.) C:\Users\Dan\Downloads\revosetup.exe
2014-08-27 07:20 - 2014-08-27 07:33 - 00042779 _____ () C:\Users\Dan\Downloads\Addition.txt
2014-08-27 07:03 - 2014-08-28 07:20 - 00000000 ____D () C:\FRST
2014-08-26 16:36 - 2014-08-26 16:36 - 01944824 _____ (Bleeping Computer, LLC) C:\Users\Dan\Downloads\rkill.exe
2014-08-25 19:02 - 2014-08-25 19:02 - 00000000 ____D () C:\_OTL
2014-08-25 18:57 - 2014-08-25 18:57 - 00602112 _____ (OldTimer Tools) C:\Users\Dan\Downloads\OTL.exe
2014-08-25 18:14 - 2014-08-27 23:25 - 00000000 ____D () C:\Users\Dan\AppData\Local\CrashDumps
2014-08-25 17:25 - 2014-08-25 17:25 - 00033512 _____ () C:\Windows\SysWOW64\Drivers\TrueSight.sys
2014-08-25 17:25 - 2014-08-25 17:25 - 00000000 ____D () C:\ProgramData\RogueKiller
2014-08-25 17:24 - 2014-08-25 17:24 - 04851288 _____ () C:\Users\Dan\Downloads\RogueKiller.exe
2014-08-25 16:10 - 2014-08-26 13:42 - 00000000 ____D () C:\ProgramData\Windows Genuine Advantage
2014-08-25 08:32 - 2014-08-25 08:32 - 01329328 _____ () C:\Users\Dan\Downloads\PANDAFREEAV(1).exe
2014-08-25 08:28 - 2014-08-25 08:28 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Panda Security
2014-08-25 08:28 - 2014-03-25 08:15 - 00060400 _____ (Panda Security, S.L.) C:\Windows\system32\Drivers\PSKMAD.sys
2014-08-25 08:27 - 2014-08-25 08:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Panda Free Antivirus
2014-08-25 08:26 - 2014-08-25 08:28 - 00000000 ____D () C:\Program Files (x86)\Panda Security
2014-08-25 08:23 - 2014-08-25 08:28 - 00000000 ____D () C:\ProgramData\Panda Security
2014-08-25 08:23 - 2014-08-25 08:23 - 01329312 _____ () C:\Users\Dan\Downloads\PANDAFREEAV.exe
2014-08-25 03:26 - 2014-08-25 08:09 - 00001945 _____ () C:\Windows\epplauncher.mif
2014-08-25 03:20 - 2014-08-25 03:21 - 13829304 _____ (Microsoft Corporation) C:\Users\Dan\Downloads\mseinstall.exe
2014-08-25 03:00 - 2014-08-25 08:12 - 00000000 ____D () C:\ProgramData\BoostSoftware
2014-08-25 02:59 - 2014-08-25 02:59 - 02958144 _____ (BoostSoftware Inc. ) C:\Users\Dan\Downloads\PCHealthBoost-Setup.exe
2014-08-24 12:59 - 2014-08-24 13:00 - 00000000 ____D () C:\Users\Dan\AppData\Local\Adobe
2014-08-24 12:53 - 2014-08-24 12:54 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-08-14 00:52 - 2014-08-14 00:52 - 00001787 _____ () C:\Users\Public\Desktop\iTunes.lnk
2014-08-14 00:52 - 2014-08-14 00:52 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iPod
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files (x86)\iTunes

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-08-28 07:21 - 2014-08-28 07:20 - 00021697 _____ () C:\Users\Dan\Desktop\FRST.txt
2014-08-28 07:20 - 2014-08-27 07:03 - 00000000 ____D () C:\FRST
2014-08-28 07:17 - 2014-08-28 07:17 - 02103296 _____ (Farbar) C:\Users\Dan\Desktop\FRST64.exe
2014-08-28 07:14 - 2009-07-13 23:45 - 00009920 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-08-28 07:14 - 2009-07-13 23:45 - 00009920 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-08-28 07:08 - 2012-06-19 23:04 - 00000000 ____D () C:\Program Files (x86)\Steam
2014-08-28 07:07 - 2009-11-01 11:06 - 00000000 ____D () C:\Users\Dan\Tracing
2014-08-28 07:07 - 2009-10-30 21:23 - 00069046 _____ () C:\Windows\PFRO.log
2014-08-28 07:07 - 2009-07-14 00:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-08-28 07:07 - 2009-07-13 23:51 - 00089551 _____ () C:\Windows\setupact.log
2014-08-28 07:06 - 2014-08-27 23:52 - 00000000 ____D () C:\AdwCleaner
2014-08-28 00:32 - 2014-08-28 00:11 - 00000022 _____ () C:\Users\Dan\Desktop\Yahtzee.dat
2014-08-28 00:25 - 2014-08-28 00:11 - 00000145 _____ () C:\Users\Dan\Desktop\hi.dat
2014-08-27 23:47 - 2014-08-27 23:47 - 01364531 _____ () C:\Users\Dan\Downloads\AdwCleaner(1).exe
2014-08-27 23:47 - 2014-08-27 23:24 - 00000347 _____ () C:\Users\Dan\Downloads\AdwCleaner.exe
2014-08-27 23:30 - 2014-08-27 23:26 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Coicbey
2014-08-27 23:30 - 2012-06-14 10:30 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-08-27 23:30 - 2011-10-12 00:09 - 00000892 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-08-27 23:30 - 2011-10-12 00:09 - 00000888 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-08-27 23:26 - 2010-07-23 14:51 - 00000000 ____D () C:\Users\Dan\AppData\Local\FLVService
2014-08-27 23:25 - 2014-08-25 18:14 - 00000000 ____D () C:\Users\Dan\AppData\Local\CrashDumps
2014-08-27 22:50 - 2010-04-04 21:55 - 00000000 ____D () C:\Program Files (x86)\Pando Networks
2014-08-27 16:17 - 2014-08-27 16:17 - 00000915 _____ () C:\Users\Dan\Desktop\Revo Uninstaller.lnk
2014-08-27 16:17 - 2014-08-27 16:16 - 00000000 ____D () C:\Users\Dan\Desktop\revounistanller
2014-08-27 16:13 - 2014-08-27 16:13 - 02623656 _____ (VS Revo Group Ltd.) C:\Users\Dan\Downloads\revosetup.exe
2014-08-27 07:33 - 2014-08-27 07:20 - 00042779 _____ () C:\Users\Dan\Downloads\Addition.txt
2014-08-26 16:36 - 2014-08-26 16:36 - 01944824 _____ (Bleeping Computer, LLC) C:\Users\Dan\Downloads\rkill.exe
2014-08-26 13:42 - 2014-08-25 16:10 - 00000000 ____D () C:\ProgramData\Windows Genuine Advantage
2014-08-25 19:02 - 2014-08-25 19:02 - 00000000 ____D () C:\_OTL
2014-08-25 18:57 - 2014-08-25 18:57 - 00602112 _____ (OldTimer Tools) C:\Users\Dan\Downloads\OTL.exe
2014-08-25 17:25 - 2014-08-25 17:25 - 00033512 _____ () C:\Windows\SysWOW64\Drivers\TrueSight.sys
2014-08-25 17:25 - 2014-08-25 17:25 - 00000000 ____D () C:\ProgramData\RogueKiller
2014-08-25 17:24 - 2014-08-25 17:24 - 04851288 _____ () C:\Users\Dan\Downloads\RogueKiller.exe
2014-08-25 17:10 - 2009-07-13 23:45 - 00430264 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-08-25 08:32 - 2014-08-25 08:32 - 01329328 _____ () C:\Users\Dan\Downloads\PANDAFREEAV(1).exe
2014-08-25 08:28 - 2014-08-25 08:28 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Panda Security
2014-08-25 08:28 - 2014-08-25 08:26 - 00000000 ____D () C:\Program Files (x86)\Panda Security
2014-08-25 08:28 - 2014-08-25 08:23 - 00000000 ____D () C:\ProgramData\Panda Security
2014-08-25 08:28 - 2009-10-30 19:34 - 00104440 _____ () C:\Users\Dan\AppData\Local\GDIPFONTCACHEV1.DAT
2014-08-25 08:27 - 2014-08-25 08:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Panda Free Antivirus
2014-08-25 08:23 - 2014-08-25 08:23 - 01329312 _____ () C:\Users\Dan\Downloads\PANDAFREEAV.exe
2014-08-25 08:20 - 2012-05-15 06:34 - 00699568 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-08-25 08:20 - 2011-06-07 18:32 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-08-25 08:18 - 2009-07-14 00:13 - 00004994 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-08-25 08:12 - 2014-08-25 03:00 - 00000000 ____D () C:\ProgramData\BoostSoftware
2014-08-25 08:09 - 2014-08-25 03:26 - 00001945 _____ () C:\Windows\epplauncher.mif
2014-08-25 03:26 - 2009-10-30 19:29 - 01375848 _____ () C:\Windows\WindowsUpdate.log
2014-08-25 03:21 - 2014-08-25 03:20 - 13829304 _____ (Microsoft Corporation) C:\Users\Dan\Downloads\mseinstall.exe
2014-08-25 02:59 - 2014-08-25 02:59 - 02958144 _____ (BoostSoftware Inc. ) C:\Users\Dan\Downloads\PCHealthBoost-Setup.exe
2014-08-24 13:07 - 2012-01-10 19:46 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Belkin
2014-08-24 13:07 - 2012-01-10 19:46 - 00000000 ____D () C:\Program Files (x86)\Belkin
2014-08-24 13:01 - 2010-03-10 19:59 - 00000000 ____D () C:\ProgramData\WinZip
2014-08-24 13:01 - 2009-10-30 19:29 - 00000000 ____D () C:\Users\Dan
2014-08-24 13:00 - 2014-08-24 12:59 - 00000000 ____D () C:\Users\Dan\AppData\Local\Adobe
2014-08-24 13:00 - 2009-08-24 23:22 - 00000000 ____D () C:\ProgramData\Adobe
2014-08-24 12:54 - 2014-08-24 12:53 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-08-24 11:33 - 2009-11-17 01:20 - 00000000 ____D () C:\Program Files (x86)\Yahoo!
2014-08-24 11:32 - 2009-07-14 00:32 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games
2014-08-24 11:31 - 2009-08-24 23:21 - 00000000 ____D () C:\Windows\System32\Tasks\ASUS
2014-08-24 11:31 - 2009-08-24 23:21 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ASUS
2014-08-24 11:31 - 2009-08-24 23:20 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-08-24 11:31 - 2009-08-24 23:19 - 00000000 ____D () C:\Program Files (x86)\ASUS
2014-08-23 22:45 - 2010-01-01 22:54 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Skype
2014-08-14 01:45 - 2010-01-01 22:54 - 00000000 ___RD () C:\Program Files (x86)\Skype
2014-08-14 00:52 - 2014-08-14 00:52 - 00001787 _____ () C:\Users\Public\Desktop\iTunes.lnk
2014-08-14 00:52 - 2014-08-14 00:52 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iTunes
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files\iPod
2014-08-14 00:51 - 2014-08-14 00:51 - 00000000 ____D () C:\Program Files (x86)\iTunes

Files to move or delete:
====================
C:\Users\Dan\jagex_runescape_preferences.dat
C:\Users\Dan\jagex_runescape_preferences2.dat


Some content of TEMP:
====================
C:\Users\Dan\AppData\Local\Temp\68583uninstall.exe
C:\Users\Dan\AppData\Local\Temp\argoomh.dll
C:\Users\Dan\AppData\Local\Temp\Quarantine.exe
C:\Users\Dan\AppData\Local\Temp\Sqlite3.dll


==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed


LastRegBack: 2014-08-28 00:50

==================== End Of Log ============================

 

 

 

 

 

 



#10 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 28 August 2014 - 08:11 AM

Hi Fell,
 
We need to run a fix with FRST:

  • Press the windows key Windows_Logo_key.gif + r on your keyboard at the same time. Type in notepad and press Enter.
  • Copy and paste the script below in the notepad document:​
BHO-x32: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} ->  No File
Toolbar: HKCU - No Name - {21FA44EF-376D-4D53-9B0F-8A89D3229068} -  No File
FF Plugin-x32: @pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll No File
CHR RestoreOnStartup: Default -> "hxxp://www.searchnu.com/406",
            "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f",
            "hxxp://www.google.com"
CHR NewTab: Default -> "chrome-extension://oocaehgghkpmfmafjenhhnkbfdjjbkic/config/skin/new-tab.html"
CHR DefaultSearchKeyword: Default -> funmoods.com
CHR DefaultSearchProvider: Default -> Funmoods
CHR DefaultSearchURL: Default -> http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
CHR Plugin: (Native Client) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\ppGoogleNaClPluginChrome.dll No File
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\pdf.dll No File
CHR Plugin: (Shockwave Flash) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\gcswf32.dll No File
CHR Plugin: (Shockwave Flash) - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_3_300_257.dll No File
CHR Plugin: (Adobe Acrobat) - C:\Program Files (x86)\Adobe\Reader 8.0\Reader\Browser\nppdf32.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll No File
CHR Plugin: (Google Update) - C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll No File
CHR Plugin: (Pando Web Plugin) - C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll No File
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh [2002-01-01]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk [2012-06-17]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli [2002-01-01]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc [2002-01-01]
2014-08-27 23:26 - 2014-08-27 23:30 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Coicbey
  • Save the file to your desktop and name it as fixlist.txt

Note: It's important that both files, FRST.exe/FRST64.exe and fixlist.txt are in the same location or the fix will not work
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

  • Run FRST.exe/FRST64.exe and press the Fix button just once and wait
  • If for some reason the tool needs a restart, please make sure you let the system restart normally, then let the tool complete its run
  • When finished, FRST will generate a log (Fixlog.txt) in the same location the tool was run.
  • Please copy and paste the log in your next reply.

 

How is your computer running now?
 
xXToffeeXx~


Edited by xXToffeeXx, 28 August 2014 - 08:12 AM.

~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#11 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 28 August 2014 - 08:30 AM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 25-08-2014
Ran by Dan at 2014-08-28 08:28:54 Run:2
Running from C:\Users\Dan\Desktop
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
\BHO-x32: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} ->  No File
Toolbar: HKCU - No Name - {21FA44EF-376D-4D53-9B0F-8A89D3229068} -  No File
FF Plugin-x32: @pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll No File
CHR RestoreOnStartup: Default -> "hxxp://www.searchnu.com/406",
            "hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f",
            "hxxp://www.google.com"
CHR NewTab: Default -> "chrome-extension://oocaehgghkpmfmafjenhhnkbfdjjbkic/config/skin/new-tab.html"
CHR DefaultSearchKeyword: Default -> funmoods.com
CHR DefaultSearchProvider: Default -> Funmoods
CHR DefaultSearchURL: Default -> http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=nv1&ir=nv1&cd=2XzuyEtN2Y1L1QzutDtDtByCtCzz0EtD0BtCyD0FyE0C0E0FtN0D0Tzu0CtAyDtDtN1L2XzutBtFtBtFtCtFyEtDyB&cr=1887634057
CHR Plugin: (Native Client) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\ppGoogleNaClPluginChrome.dll No File
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\pdf.dll No File
CHR Plugin: (Shockwave Flash) - C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\gcswf32.dll No File
CHR Plugin: (Shockwave Flash) - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_3_300_257.dll No File
CHR Plugin: (Adobe Acrobat) - C:\Program Files (x86)\Adobe\Reader 8.0\Reader\Browser\nppdf32.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll No File
CHR Plugin: (QuickTime Plug-in 7.7.2) - C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll No File
CHR Plugin: (Google Update) - C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll No File
CHR Plugin: (Pando Web Plugin) - C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll No File
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh [2002-01-01]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk [2012-06-17]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli [2002-01-01]
CHR Extension: (No Name) - C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc [2002-01-01]
2014-08-27 23:26 - 2014-08-27 23:30 - 00000000 ____D () C:\Users\Dan\AppData\Roaming\Coicbey
*****************

"HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}" => Key deleted successfully.
"HKCR\Wow6432Node\CLSID\{5C255C8A-E604-49b4-9D64-90988571CECB}" => Key not found.
HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{21FA44EF-376D-4D53-9B0F-8A89D3229068} => value deleted successfully.
"HKCR\CLSID\{21FA44EF-376D-4D53-9B0F-8A89D3229068}" => Key not found.
"HKLM\Software\Wow6432Node\MozillaPlugins\@pandonetworks.com/PandoWebPlugin" => Key deleted successfully.
Chrome RestoreOnStartup deleted successfully.
"hxxp://search.babylon.com/?affID=109935&tt=060612_6_&babsrc=HP_ss&mntrId=4ced4cef000000000000002618e0b15f", => Error: No automatic fix found for this entry.
"hxxp://www.google.com" => Error: No automatic fix found for this entry.
Chrome NewTab deleted successfully.
Chrome DefaultSearchKeyword deleted successfully.
CHR DefaultSearchProvider: Default -> Funmoods ==> The Chrome "Settings" can be used to fix the entry.
Chrome DefaultSearchURL deleted successfully.
C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\ppGoogleNaClPluginChrome.dll not found.
C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\pdf.dll not found.
C:\Program Files (x86)\Google\Chrome\Application\29.0.1547.62\gcswf32.dll not found.
C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_3_300_257.dll not found.
C:\Program Files (x86)\Adobe\Reader 8.0\Reader\Browser\nppdf32.dll not found.
C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll not found.
C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll not found.
C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll not found.
C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll not found.
C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbjciahceamgodcoidkjpchnokgfpphh => Moved successfully.
C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\defdhglnppeioeflggkmglipcecffkhk => Moved successfully.
C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkjoindjjcmbdpbfppabdgflnkgbbcli => Moved successfully.
C:\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc => Moved successfully.
C:\Users\Dan\AppData\Roaming\Coicbey => Moved successfully.

==== End of Fixlog ====



#12 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 28 August 2014 - 08:33 AM

The computer is no longer constantly active.  I don't see the dlll overloads anymore.  Thank you so much for your time and effort here; my machine may yet be back to useable.

 

Thank you for making me aware of the danger of the machine moving forward.  I do not use the machine for banking or anything that needs to be secure.  It is a gaming platform only and music storage only and I have changed all passwords for these applications on a different computer.

 

Again, thank you so much for your time with this.  I was afraid that it would not be recoverable at all.



#13 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 28 August 2014 - 01:17 PM

Hi Fell,
 
That's good news and you're welcome.
 
Download Emsisoft Emergency Kit and save it to your desktop. Double click on EmsisoftEmergencyKit.exe to extract its contents and create a shortcut on the desktop. Leave all settings as they are and click  Accept & Extract. A folder named EEK will be created in the root of the drive (usually c:\). .

  • After extraction an Emsisoft Emergency Kit window will open. Under "Run Directly:" click Emergency Kit Scanner.
  • When asked to run an online update, click Yes.
  • When the update is finished, click the Back to Security Status link in the left corner. On the main screen click the Scan Now button.
  • Select the Full Scan option and click the SCAN button.
  • When the scan is finished click the Quarantine selected objects button. Note, this option is only available if malicious objects were detected during the scan.
  • Click the View Report button and in the Reports window double-click on the most recent log. Note, logs are named as follows: a2scan_<date>-<time>.txt.
  • Copy/paste the report contents in your next reply.

--------------

This scan can take a long time, so it is best done overnight or when you do not need the computer
 
I'd like us to scan your machine with ESET OnlineScan

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#14 Fell

Fell
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:04:43 AM

Posted 28 August 2014 - 11:22 PM

Emsisoft Emergency Kit - Version 9.0
Last update: 8/28/2014 3:14:28 PM
User account: SuperNewt\Dan

Scan settings:

Scan type: Full Scan
Objects: Rootkits, Memory, Traces, C:\, D:\

Detect PUPs: Off
Scan archives: On
ADS Scan: On
File extension filter: Off
Advanced caching: On
Direct disk access: Off

Scan start:    8/28/2014 3:15:38 PM
C:\Users\Dan\AppData\Roaming\software informer     detected: Application.AppInstall ( A )
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\W3I     detected: Application.InstallAd ( A )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\L\00000004.@     detected: Trojan.Win32.ZAccess ( A )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\00000004.@     detected: Trojan.Sirefef.GY ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\00000008.@ -> (Embedded EXE g)     detected: Trojan.Sirefef.GA ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\000000cb.@     detected: Trojan.Sirefef.HK ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\80000000.@     detected: Trojan.Sirefef.JS ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\80000032.@     detected: Gen:Trojan.Heur.Sirefef.1 ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\80000064.@     detected: Trojan.Generic.7949316 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\conhost.exe.xBAD     detected: Trojan.GenericKD.1813535 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\e.dll.xBAD     detected: Gen:Variant.Symmi.45641 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_140cf8a4.exe.xBAD     detected: Trojan.GenericKD.1823792 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_b3113484.exe.xBAD     detected: Trojan.GenericKD.1822276 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Roaming\bssbdgdt\etvuetvw.exe.xBAD     detected: Trojan.GenericKD.1824020 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Roaming\Coicbey\etefz.exe     detected: Gen:Variant.Zusy.104305 ( B )
C:\ProgramData\RogueKiller\Quarantine\9451BE7E58EA84B3.vir     detected: Trojan.GenericKD.1813535 ( B )
C:\ProgramData\Windows Genuine Advantage\{37BCA684-B524-4BC4-A7FD-481564A960BE}\msiexec.exe     detected: Trojan.Agent.BEWT ( B )
C:\ProgramData\Windows Genuine Advantage\{9880A48F-0BAB-4097-82FC-A54C0271658A}\msiexec.exe     detected: Trojan.Injector.AYV ( B )
C:\Users\Dan\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACJS5I4E\ttCAQ4RAII.htm     detected: Trojan.JS.Redirector.ALT ( B )
C:\Users\Dan\AppData\Local\Temp\3BA4.tmp     detected: Trojan.GenericKD.1822261 ( B )
C:\Users\Dan\AppData\Local\Temp\598B.tmp     detected: Gen:Variant.Zusy.82397 ( B )
C:\Users\Dan\AppData\Local\Temp\7FA6.tmp     detected: Trojan.GenericKD.1821934 ( B )
C:\Users\Dan\AppData\Local\Temp\8B65.tmp     detected: Gen:Variant.Graftor.152730 ( B )
C:\Users\Dan\AppData\Local\Temp\C02C.tmp     detected: Trojan.GenericKD.1811967 ( B )
C:\Users\Dan\AppData\Local\Temp\F6A7.tmp     detected: Trojan.Injector.AYV ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1023\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1040\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\104\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1058\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1100\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1104\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1146\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1153\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1160\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1238\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1241\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1243\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1306\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1307\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1342\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1401\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1403\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\150\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1533\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1573\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1602\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\162\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1693\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1699\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1722\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1750\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1763\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1814\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1867\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1908\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\192\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1956\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\196\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2007\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2029\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\202\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2034\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2046\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2090\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2105\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2118\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2138\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2196\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2233\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2298\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2321\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\234\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2357\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2377\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\237\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2380\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2383\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2424\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2464\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2499\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2528\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\254\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2596\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2604\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2612\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\263\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2686\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2721\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\276\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2774\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2798\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2809\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2817\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2850\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2879\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2887\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2889\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\28\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2919\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2921\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2972\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2984\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3045\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3049\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\304\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3133\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3143\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3148\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3238\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3245\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3262\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3266\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3267\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3273\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3289\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3330\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3357\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3376\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3391\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3406\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3434\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3495\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3498\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3585\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\35\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3619\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3668\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3699\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3761\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3771\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3822\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3827\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3850\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3910\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3927\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3957\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3968\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4008\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4019\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4069\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4072\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4117\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4172\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4185\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4190\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4227\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4244\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4250\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4269\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4288\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\428\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4318\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4325\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4382\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4453\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4469\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4476\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\448\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4520\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4528\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4575\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4577\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4592\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4645\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4649\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4663\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4673\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4704\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4733\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4762\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4770\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\478\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4824\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4870\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4962\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4970\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\498\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4991\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5008\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5042\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5052\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5069\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5080\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5136\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5165\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\522\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5239\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5241\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\528\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5295\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5307\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5373\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5453\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5473\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5527\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\557\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5593\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5603\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5653\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5715\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5716\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5790\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5801\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5864\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5866\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5870\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5890\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5981\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6039\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6040\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6044\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6083\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6101\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6134\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6165\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6197\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\61\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6205\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6211\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\629\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6312\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6329\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6353\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6369\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6420\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6427\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6435\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6442\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6535\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6571\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6591\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\659\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6685\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6695\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6720\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\672\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6748\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6765\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6791\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6806\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6810\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6846\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6870\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6889\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6895\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6937\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6954\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7000\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7054\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7068\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7076\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7106\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7161\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7171\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7189\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\719\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7201\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7246\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7250\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7269\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7312\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7327\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7329\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7350\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\740\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7422\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7492\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7510\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7528\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7539\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\754\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7595\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7648\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7659\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7665\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7680\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7743\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\774\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7793\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\779\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7819\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7842\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7902\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7919\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7984\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8105\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8115\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8120\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\813\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8163\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8180\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8182\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8186\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8187\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8209\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8230\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8250\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8300\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8321\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8354\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8375\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8385\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8428\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8445\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8475\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8495\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8501\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8527\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8553\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8607\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8620\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8627\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8637\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\865\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8693\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8707\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8757\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8766\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8766\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8782\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8819\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8827\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8838\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8841\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8875\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8887\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8901\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8909\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8931\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8974\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9007\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9008\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9037\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9060\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9076\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9080\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9083\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9091\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9110\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9180\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9222\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9265\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9277\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9296\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9302\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9330\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9372\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9480\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9519\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9531\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9545\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9558\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9574\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9588\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9601\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\960\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\968\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9696\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9697\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9708\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9724\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9726\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9728\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9747\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9763\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9766\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\976\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9786\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9803\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9815\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9822\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9832\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9833\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9851\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9869\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9872\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\991\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9957\conhost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\99\svchost.exe     detected: Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\LocalLow\krcldzt.dll     detected: Trojan.GenericKD.1826934 ( B )
C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\593c7952-49535b7f     detected: Trojan.Script.8027 ( B )
C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\4cc7c9e1-5c6b7bea     detected: Trojan.Script.8027 ( B )

Scanned    1010097
Found    382

Scan end:    8/28/2014 7:31:16 PM
Scan time:    4:15:38

C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\4cc7c9e1-5c6b7bea    Quarantined Trojan.Script.8027 ( B )
C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\593c7952-49535b7f    Quarantined Trojan.Script.8027 ( B )
C:\Users\Dan\AppData\LocalLow\krcldzt.dll    Quarantined Trojan.GenericKD.1826934 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\99\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9957\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\991\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9872\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9869\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9851\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9833\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9832\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9822\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9815\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9803\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9786\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\976\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9766\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9763\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9747\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9728\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9726\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9724\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9708\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9697\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9696\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\968\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\960\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9601\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9588\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9574\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9558\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9545\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9531\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9519\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9480\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9372\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9330\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9302\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9296\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9277\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9265\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9222\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9180\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9110\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9091\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9083\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9080\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9076\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9060\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9037\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9008\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\9007\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8974\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8931\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8909\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8901\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8887\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8875\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8841\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8838\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8827\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8819\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8782\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8766\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8766\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8757\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8707\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8693\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\865\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8637\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8627\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8620\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8607\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8553\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8527\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8501\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8495\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8475\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8445\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8428\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8385\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8375\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8354\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8321\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8300\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8250\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8230\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8209\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8187\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8186\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8182\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8180\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8163\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\813\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8120\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8115\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\8105\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7984\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7919\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7902\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7842\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7819\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\779\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7793\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\774\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7743\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7680\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7665\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7659\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7648\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7595\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\754\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7539\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7528\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7510\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7492\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7422\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\740\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7350\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7329\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7327\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7312\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7269\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7250\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7246\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7201\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\719\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7189\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7171\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7161\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7106\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7076\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7068\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7054\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\7000\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6954\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6937\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6895\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6889\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6870\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6846\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6810\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6806\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6791\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6765\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6748\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\672\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6720\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6695\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6685\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\659\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6591\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6571\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6535\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6442\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6435\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6427\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6420\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6369\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6353\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6329\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6312\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\629\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6211\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6205\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\61\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6197\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6165\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6134\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6101\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6083\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6044\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6040\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\6039\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5981\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5890\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5870\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5866\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5864\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5801\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5790\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5716\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5715\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5653\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5603\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5593\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\557\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5527\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5473\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5453\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5373\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5307\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5295\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\528\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5241\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5239\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\522\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5165\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5136\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5080\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5069\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5052\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5042\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\5008\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4991\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\498\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4970\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4962\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4870\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4824\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\478\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4770\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4762\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4733\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4704\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4673\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4663\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4649\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4645\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4592\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4577\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4575\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4528\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4520\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\448\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4476\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4469\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4453\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4382\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4325\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4318\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\428\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4288\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4269\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4250\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4244\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4227\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4190\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4185\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4172\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4117\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4072\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4069\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4019\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\4008\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3968\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3957\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3927\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3910\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3850\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3827\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3822\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3771\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3761\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3699\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3668\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3619\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\35\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3585\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3498\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3495\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3434\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3406\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3391\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3376\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3357\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3330\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3289\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3273\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3267\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3266\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3262\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3245\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3238\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3148\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3143\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3133\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\304\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3049\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\3045\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2984\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2972\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2921\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2919\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\28\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2889\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2887\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2879\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2850\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2817\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2809\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2798\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2774\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\276\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2721\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2686\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\263\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2612\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2604\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2596\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\254\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2528\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2499\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2464\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2424\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2383\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2380\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\237\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2377\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2357\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\234\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2321\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2298\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2233\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2196\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2138\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2118\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2105\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2090\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2046\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2034\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\202\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2029\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\2007\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\196\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1956\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\192\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1908\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1867\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1814\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1763\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1750\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1722\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1699\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1693\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\162\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1602\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1573\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1533\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\150\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1403\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1401\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1342\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1307\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1306\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1243\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1241\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1238\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1160\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1153\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1146\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1104\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1100\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1058\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\104\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1040\svchost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\SessionWin32k\1023\conhost.exe    Quarantined Trojan.GenericKD.1813535 ( B )
C:\Users\Dan\AppData\Local\Temp\F6A7.tmp    Quarantined Trojan.Injector.AYV ( B )
C:\Users\Dan\AppData\Local\Temp\C02C.tmp    Quarantined Trojan.GenericKD.1811967 ( B )
C:\Users\Dan\AppData\Local\Temp\8B65.tmp    Quarantined Gen:Variant.Graftor.152730 ( B )
C:\Users\Dan\AppData\Local\Temp\7FA6.tmp    Quarantined Trojan.GenericKD.1821934 ( B )
C:\Users\Dan\AppData\Local\Temp\598B.tmp    Quarantined Gen:Variant.Zusy.82397 ( B )
C:\Users\Dan\AppData\Local\Temp\3BA4.tmp    Quarantined Trojan.GenericKD.1822261 ( B )
C:\Users\Dan\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACJS5I4E\ttCAQ4RAII.htm    Quarantined Trojan.JS.Redirector.ALT ( B )
C:\ProgramData\Windows Genuine Advantage\{9880A48F-0BAB-4097-82FC-A54C0271658A}\msiexec.exe    Quarantined Trojan.Injector.AYV ( B )
C:\ProgramData\Windows Genuine Advantage\{37BCA684-B524-4BC4-A7FD-481564A960BE}\msiexec.exe    Quarantined Trojan.Agent.BEWT ( B )
C:\ProgramData\RogueKiller\Quarantine\9451BE7E58EA84B3.vir    Quarantined Trojan.GenericKD.1813535 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Roaming\Coicbey\etefz.exe    Quarantined Gen:Variant.Zusy.104305 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Roaming\bssbdgdt\etvuetvw.exe.xBAD    Quarantined Trojan.GenericKD.1824020 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_b3113484.exe.xBAD    Quarantined Trojan.GenericKD.1822276 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\UpdateFlashPlayer_140cf8a4.exe.xBAD    Quarantined Trojan.GenericKD.1823792 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\e.dll.xBAD    Quarantined Gen:Variant.Symmi.45641 ( B )
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\conhost.exe.xBAD    Quarantined Trojan.GenericKD.1813535 ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\80000064.@    Quarantined Trojan.Generic.7949316 ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\80000032.@    Quarantined Gen:Trojan.Heur.Sirefef.1 ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\80000000.@    Quarantined Trojan.Sirefef.JS ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\000000cb.@    Quarantined Trojan.Sirefef.HK ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\00000008.@    Quarantined Trojan.Sirefef.GA ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\U\00000004.@    Quarantined Trojan.Sirefef.GY ( B )
C:\FRST\Quarantine\C\$Recycle.Bin\S-1-5-18\$7d049a04e11b896b2a9dfd255201f599\L\00000004.@    Quarantined Trojan.Win32.ZAccess (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\W3I    Quarantined Application.InstallAd (A)
C:\Users\Dan\AppData\Roaming\software informer    Quarantined Application.AppInstall (A)

Quarantined    382
 

 

 

 

 

C:\$Recycle.Bin\S-1-5-21-2015888278-3637765471-366299829-1001\$R4R5HJT.exe    Win32/Toolbar.SearchSuite potentially unwanted application    deleted - quarantined
C:\$Recycle.Bin\S-1-5-21-2015888278-3637765471-366299829-1001\$R5KL31D.exe    Win32/Toolbar.SearchSuite potentially unwanted application    deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\FunWebProducts\Installr\1.bin\F3EZSETP.DLL.vir    a variant of Win32/FunWeb.AA potentially unwanted application    deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\FunWebProducts\Installr\1.bin\F3PLUGIN.DLL.vir    Win32/Toolbar.MyWebSearch potentially unwanted application    deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\FunWebProducts\Installr\1.bin\NPFUNWEB.DLL.vir    Win32/Toolbar.MyWebSearch potentially unwanted application    deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\Yontoo\YontooIEClient.dll.vir    a variant of Win32/Adware.Yontoo.A application    cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\Yontoo\YontooLayers.crx.vir    multiple threats    deleted - quarantined
C:\AdwCleaner\Quarantine\C\ProgramData\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\_Setupx.dll.vir    a variant of Win32/Adware.Yontoo.B application    cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Dan\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc\1.0.3_0\yl.js.vir    JS/Adware.Yontoo.A application    cleaned by deleting - quarantined
C:\FRST\Quarantine\C\Users\Dan\AppData\Local\Temp\{F72FF6B1-02E0-472F-8CFD-A9D7DACDD19A}.exe.xBAD    a variant of Win32/Toolbar.Visicom.A potentially unwanted application    deleted - quarantined
C:\Program Files (x86)\Panda Security\Panda Security Protection\Tools\PandaSecurityTb.exe    a variant of Win32/Toolbar.Visicom.A potentially unwanted application    deleted - quarantined
C:\Users\Dan\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\G5Z9NWZ9\ifCANE2YB7.htm    HTML/ScrInject.B.Gen virus    deleted - quarantined
C:\Users\Dan\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\K2OZEGX8\ifCA4TB34F.htm    HTML/ScrInject.B.Gen virus    deleted - quarantined
C:\Users\Dan\AppData\Local\Temp\argoomh.dll    Win32/TrojanDownloader.Tracur.AL trojan    cleaned by deleting - quarantined
C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\2fe7738b-51c4da10    multiple threats    cleaned by deleting - quarantined
C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4\2d9c5344-32c1b076    a variant of Java/Obfus.CG trojan    cleaned by deleting - quarantined
C:\Users\Dan\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6\752f1686-54948e2b    a variant of Java/Obfus.CG trojan    cleaned by deleting - quarantined
 



#15 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:43 AM

Posted 29 August 2014 - 08:40 AM

Hi Fell,
 
Download ATF Cleaner and save it to your desktop:

  • Double-click ATF-Cleaner.exe
  • Under Main choose Select All
  • Uncheck cookies
  • Click the Empty Selected button

If you use Firefox web browser

  • Click Firefox at the top and choose: Select All
  • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
  • Uncheck cookies
  • Click the Empty Selected button

If you use Opera web browser

  • Click Opera at the top and choose: Select All
  • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
  • Uncheck cookies
  • Click the Empty Selected button

--------------
 
Please download Farbar Service Scanner and run it on the computer with the issue.

  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users