Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Svchost using lots of memory on windows 7.


  • Please log in to reply
14 replies to this topic

#1 Steelers2025

Steelers2025

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 18 January 2015 - 01:24 PM

My PC just started getting slow out of the blue. I decided to look at the task manager and see what was using all my memory. I found that one of the Svchost.exe (netsvcs) is using a ton on memory and sometimes a lot of CPU. I'm looking for any help on fixing this problem. I have attached a photo to show you what i'm talking about.

Attached Files

  • Attached File  PC.JPG   147.88KB   0 downloads

Edited by Queen-Evie, 18 January 2015 - 01:48 PM.
moved from Windows 7 to Am I Infected


BC AdBot (Login to Remove)

 


#2 PcPhoenix

PcPhoenix

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:07:58 PM

Posted 18 January 2015 - 01:43 PM

There are usually multiple svchosts, they are parent processes of many different services. Chances are you have a rouge service (malware) running underneath one of these svchosts.
 

Could you take a better screenshot of all the services running under that specific svchos process? Id would help to see all of them.



#3 Steelers2025

Steelers2025
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 18 January 2015 - 02:01 PM

muwjnk.jpg



#4 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 18 January 2015 - 03:38 PM

Step 1: Minitoolbox.
 
Please download MINITOOLBOX and run it.



Checkmark following boxes:


Flush DNS
Reset FF proxy Settings
Reset Ie Proxy Settings
Report IE Proxy Settings
Report FF Proxy Settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size
List Devices (problems only)



Click Go and post the result.
 
Step 2: Junkware Removal Tool.
 
Please download Junkware Removal Tool and save it on your desktop.

  • Shut down your anti-virus, anti-spyware, and firewall software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log is saved to your desktop and will automatically open.
  • Please post the JRT log.

Step 3: Adware Cleaner.
 
Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

Step 4: Adware Removal Tool.
 
Download Adware removal tool to your desktop, right click the icon and select Run as Administrator.

LOr0Gd7.png

Hit Ok.

sYFsqHx.png

Hit next make sure to leave all items checked, for removal.

8NcZjGc.png


The Program will close all open programs to complete the removal, so save any work and hit OK. Then hit OK after the removal process is complete,  then OK again to finish up. Post log generated by tool.
 
Step 5: Malwarebytes AntiRootkit
 
 
Download Malwarebytes Anti-Rootkit to your desktop.
  • Double-click the icon to start the tool.
  • It will ask you where to extract make sure it is on the desktop.
  • Malwarebytes Anti-Rootkit needs to be run from an account with admin rights.
  • Click next to continue.
  • Then Click Update
  • Once the update is Finished select Next then Scan.
  • If no malware has been found, at the end of scan select Exit
  • If an infection was found, make sure to select all items and click Cleanup.
  • Reboot your machine.
  • Open the MBAR folder and paste the content of the following into your next reply:
  • mbar-log-{date} (xx-xx-xx).txt
  • system-log.txt

[/*]

Step 6: Security Check Log.
 
Download Security Check from here or here and save it to your Desktop.
  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document

 
Step 7: Report
 
Tell me how the machine is performing, and if you need help performing any steps. Also post all requested logs.



#5 Steelers2025

Steelers2025
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 18 January 2015 - 08:32 PM

MiniToolBox by Farbar  Version: 30-11-2014
Ran by Mike Chips (administrator) on 18-01-2015 at 19:37:46
Running from "C:\Users\Mike Chips\Desktop"
Microsoft Windows 7 Home Premium  Service Pack 1 (X86)
Boot Mode: Normal
***************************************************************************
 
========================= Flush DNS: ===================================
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========================= IE Proxy Settings: ============================== 
 
Proxy is not enabled.
No Proxy Server is set.
 
"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================
 
127.0.0.2 www.onhax.net
127.0.0.2 www.forum.onhax.net
 
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1001namen.com
127.0.0.1 www.1001namen.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100888290cs.com
127.0.0.1 www.100sexlinks.com
 
There are 15474 more lines starting with "127.0.0.1"
 
========================= IP Configuration: ================================
 
Broadcom NetXtreme 57xx Gigabit Controller = Local Area Connection (Connected)
 
 
# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
 
reset
set global icmpredirects=enabled
add route prefix=0.0.0.0/0 interface="Local Area Connection" nexthop=192.168.1.1 publish=Yes
add address name="Local Area Connection" address=192.168.1.105 mask=255.255.255.0
 
 
popd
# End of IPv4 configuration
 
 
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : MikeChips-PC
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Ethernet adapter Local Area Connection:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Broadcom NetXtreme 57xx Gigabit Controller
   Physical Address. . . . . . . . . : 00-1A-A0-1E-AB-38
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.1.105(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.1
   DNS Servers . . . . . . . . . . . : 24.154.1.8
                                       24.154.1.67
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Tunnel adapter isatap.{5856AD0B-47F5-45D1-9761-F1F52805D272}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter Teredo Tunneling Pseudo-Interface:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fb:2d:192f:3f57:fe96(Preferred) 
   Link-local IPv6 Address . . . . . : fe80::2d:192f:3f57:fe96%14(Preferred) 
   Default Gateway . . . . . . . . . : ::
   NetBIOS over Tcpip. . . . . . . . : Disabled
Server:  dns-3.zoominternet.net
Address:  24.154.1.8
 
Name:    google.com
Addresses:  2607:f8b0:4004:807::1004
 74.125.228.238
 74.125.228.232
 74.125.228.233
 74.125.228.231
 74.125.228.228
 74.125.228.229
 74.125.228.225
 74.125.228.226
 74.125.228.230
 74.125.228.227
 74.125.228.224
 
 
Pinging google.com [74.125.228.229] with 32 bytes of data:
Reply from 74.125.228.229: bytes=32 time=36ms TTL=53
Reply from 74.125.228.229: bytes=32 time=38ms TTL=53
 
Ping statistics for 74.125.228.229:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 36ms, Maximum = 38ms, Average = 37ms
Server:  dns-3.zoominternet.net
Address:  24.154.1.8
 
Name:    yahoo.com
Addresses:  98.138.253.109
 98.139.183.24
 206.190.36.45
 
 
Pinging yahoo.com [98.139.183.24] with 32 bytes of data:
Reply from 98.139.183.24: bytes=32 time=32ms TTL=49
Reply from 98.139.183.24: bytes=32 time=77ms TTL=49
 
Ping statistics for 98.139.183.24:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 32ms, Maximum = 77ms, Average = 54ms
 
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
 
Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
 11...00 1a a0 1e ab 38 ......Broadcom NetXtreme 57xx Gigabit Controller
  1...........................Software Loopback Interface 1
 12...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
 14...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.105    276
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link     192.168.1.105    276
    192.168.1.105  255.255.255.255         On-link     192.168.1.105    276
    192.168.1.255  255.255.255.255         On-link     192.168.1.105    276
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link     192.168.1.105    276
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link     192.168.1.105    276
===========================================================================
Persistent Routes:
  Network Address          Netmask  Gateway Address  Metric
          0.0.0.0          0.0.0.0      192.168.1.1  Default 
===========================================================================
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 14     58 ::/0                     On-link
  1    306 ::1/128                  On-link
 14     58 2001::/32                On-link
 14    306 2001:0:5ef5:79fb:2d:192f:3f57:fe96/128
                                    On-link
 14    306 fe80::/64                On-link
 14    306 fe80::2d:192f:3f57:fe96/128
                                    On-link
  1    306 ff00::/8                 On-link
 14    306 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================
 
Catalog5 01 C:\Windows\system32\NLAapi.dll [52224] (Microsoft Corporation)
Catalog5 02 C:\Windows\system32\napinsp.dll [52224] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 05 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog5 06 C:\Windows\system32\winrnr.dll [20992] (Microsoft Corporation)
Catalog5 07 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [145648] (Microsoft Corp.)
Catalog5 08 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [145648] (Microsoft Corp.)
Catalog9 01 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [231424] (Microsoft Corporation)
 
========================= Event log errors: ===============================
 
Application errors:
==================
Error: (01/18/2015 02:57:57 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (01/18/2015 02:56:36 PM) (Source: LMS) (User: NT AUTHORITY)
Description: LMS Service cannot connect to HECI driver
 
Error: (01/16/2015 03:15:13 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"1".
Dependent Assembly Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (01/14/2015 00:36:35 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"1".
Dependent Assembly Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (01/13/2015 02:33:18 PM) (Source: Application Hang) (User: )
Description: The program SnippingTool.exe version 6.1.7600.16385 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.
 
Process ID: 1358
 
Start Time: 01d02f67ac58f768
 
Termination Time: 57
 
Application Path: C:\Windows\system32\SnippingTool.exe
 
Report Id: 03060589-9b5b-11e4-9028-001aa01eab38
 
Error: (01/13/2015 01:03:10 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"1".
Dependent Assembly Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (01/08/2015 01:35:16 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"1".
Dependent Assembly Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (01/07/2015 10:29:04 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (01/07/2015 10:28:17 PM) (Source: LMS) (User: NT AUTHORITY)
Description: LMS Service cannot connect to HECI driver
 
Error: (01/07/2015 10:24:19 PM) (Source: VSS) (User: )
Description: Volume Shadow Copy Service error: Unexpected error querying for the IVssWriterCallback interface.  hr = 0x80070005, Access is denied.
.
This is often caused by incorrect security settings in either the writer or requestor process.
 
 
Operation:
   Gathering Writer Data
 
Context:
   Writer Class Id: {e8132975-6f93-4464-a53e-1050253ae220}
   Writer Name: System Writer
   Writer Instance ID: {92b308ed-3328-4fa4-80b0-a83f6055a0bd}
 
 
System errors:
=============
Error: (01/07/2015 10:30:21 PM) (Source: Service Control Manager) (User: )
Description: The Adobe Acrobat Update Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (01/07/2015 01:39:09 AM) (Source: Service Control Manager) (User: )
Description: The Adobe Acrobat Update Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (01/01/2015 08:21:57 PM) (Source: Schannel) (User: NT AUTHORITY)
Description: The following fatal alert was generated: 70. The internal error state is 105.
 
Error: (12/26/2014 06:14:08 PM) (Source: Service Control Manager) (User: )
Description: The Adobe Acrobat Update Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/26/2014 06:12:45 PM) (Source: EventLog) (User: )
Description: The previous system shutdown at 6:07:59 PM on ‎12/‎26/‎2014 was unexpected.
 
Error: (12/25/2014 08:59:33 PM) (Source: Service Control Manager) (User: )
Description: The Adobe Acrobat Update Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/25/2014 08:57:45 PM) (Source: EventLog) (User: )
Description: The previous system shutdown at 8:56:05 PM on ‎12/‎25/‎2014 was unexpected.
 
Error: (12/25/2014 04:09:46 PM) (Source: Service Control Manager) (User: )
Description: The ScRegSetValueExW call failed for Start with the following error: 
%%5
 
Error: (12/25/2014 04:09:43 PM) (Source: Service Control Manager) (User: )
Description: The ScRegSetValueExW call failed for Start with the following error: 
%%5
 
Error: (12/25/2014 04:09:36 PM) (Source: Service Control Manager) (User: )
Description: The ScRegSetValueExW call failed for Start with the following error: 
%%5
 
 
Microsoft Office Sessions:
=========================
Error: (01/18/2015 02:57:57 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (01/18/2015 02:56:36 PM) (Source: LMS)(User: NT AUTHORITY)
Description: LMS Service cannot connect to HECI driver
 
Error: (01/16/2015 03:15:13 AM) (Source: SideBySide)(User: )
Description: Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"C:\Program Files\HP\HP Deskjet 1000 J110 series\DriverStore\Pipeline\amd64\hpinkins8811.exe
 
Error: (01/14/2015 00:36:35 AM) (Source: SideBySide)(User: )
Description: Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"C:\Program Files\HP\HP Deskjet 1000 J110 series\DriverStore\Pipeline\amd64\hpinkins8811.exe
 
Error: (01/13/2015 02:33:18 PM) (Source: Application Hang)(User: )
Description: SnippingTool.exe6.1.7600.16385135801d02f67ac58f76857C:\Windows\system32\SnippingTool.exe03060589-9b5b-11e4-9028-001aa01eab38
 
Error: (01/13/2015 01:03:10 AM) (Source: SideBySide)(User: )
Description: Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"C:\Program Files\HP\HP Deskjet 1000 J110 series\DriverStore\Pipeline\amd64\hpinkins8811.exe
 
Error: (01/08/2015 01:35:16 AM) (Source: SideBySide)(User: )
Description: Microsoft.Windows.Common-Controls,language="&#x2a;",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"C:\Program Files\HP\HP Deskjet 1000 J110 series\DriverStore\Pipeline\amd64\hpinkins8811.exe
 
Error: (01/07/2015 10:29:04 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (01/07/2015 10:28:17 PM) (Source: LMS)(User: NT AUTHORITY)
Description: LMS Service cannot connect to HECI driver
 
Error: (01/07/2015 10:24:19 PM) (Source: VSS)(User: )
Description: 0x80070005, Access is denied.
 
 
Operation:
   Gathering Writer Data
 
Context:
   Writer Class Id: {e8132975-6f93-4464-a53e-1050253ae220}
   Writer Name: System Writer
   Writer Instance ID: {92b308ed-3328-4fa4-80b0-a83f6055a0bd}
 
 
 
[PS3] Save Resigner (HKLM\...\[PS3] Save Resigner 2.0.2) (Version: 2.0.2 - The Prince of Codes)
[PS3] Save Resigner (Version: 2.0.2 - The Prince of Codes) Hidden
=========================== Installed Programs ============================
µTorrent (HKCU\...\uTorrent) (Version: 3.4.2.36802 - BitTorrent Inc.)
7-Zip 9.22beta (HKLM\...\7-Zip) (Version:  - )
Adobe Flash Player 16 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 16.0.0.257 - Adobe Systems Incorporated)
Adobe Flash Player 16 NPAPI (HKLM\...\Adobe Flash Player NPAPI) (Version: 16.0.0.257 - Adobe Systems Incorporated)
Adobe Reader XI (11.0.10) (HKLM\...\{AC76BA86-7AD7-1033-7B44-AB0000000001}) (Version: 11.0.10 - Adobe Systems Incorporated)
Audacity 2.0.6 (HKLM\...\Audacity_is1) (Version: 2.0.6 - Audacity Team)
Battle.net (HKLM\...\Battle.net) (Version:  - Blizzard Entertainment)
BotRevolt Free 1.4.3 (HKLM\...\{41BB8B6E-3337-4655-8FBB-2295A460619C}_is1) (Version: 1.4.3 - BotRevolt)
CCleaner (HKLM\...\CCleaner) (Version: 4.19 - Piriform)
CDBurnerXP (HKLM\...\{7E265513-8CDA-4631-B696-F40D983F3B07}_is1) (Version: 4.5.4.4852 - CDBurnerXP)
CDisplayEx 1.10.29 (HKLM\...\CDisplayEx_is1) (Version:  - Progdigy Software S.A.R.L.)
ComicRack v0.9.176 (HKLM\...\ComicRack) (Version: v0.9.176 - cYo Soft)
ConvertXtoDVD 4.1.19.365 (HKLM\...\{DB6AB705-C9BD-40E3-8929-2EA57F36A4FF}_is1) (Version: 4.1.19.365 - )
D3DX10 (Version: 15.4.2368.0902 - Microsoft) Hidden
EA SPORTS Game Face Browser Plugin 1.8.0.0 (HKCU\...\EA SPORTS Game Face Browser Plugin) (Version: 1.8.0.0 - Electronic Arts)
Final Draft (HKLM\...\{7C3C895B-AE02-4F30-8A6A-051D37A38DD0}) (Version: 8.0.3.120 - Final Draft, Inc.)
Glary Utilities 5.16 (HKLM\...\Glary Utilities 5) (Version: 5.16.0.29 - Glarysoft Ltd)
Google Chrome (HKLM\...\Google Chrome) (Version: 39.0.2171.99 - Google Inc.)
Google Update Helper (Version: 1.3.25.11 - Google Inc.) Hidden
Hearthstone (HKLM\...\Hearthstone) (Version:  - Blizzard Entertainment)
HP Deskjet 1000 J110 series Basic Device Software (HKLM\...\{AB4DDFCF-6CCB-4539-920B-74AD7CFB043D}) (Version: 28.0.1313.0 - Hewlett-Packard Co.)
Intel® Management Engine Interface (HKLM\...\HECI) (Version:  - Intel Corporation)
Intel® Active Management Technology (HKLM\...\MESOL) (Version:  - Intel Corporation)
Java 8 Update 25 (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F83218025F0}) (Version: 8.0.250 - Oracle Corporation)
Java Auto Updater (Version: 2.8.25.18 - Oracle Corporation) Hidden
JetClean (HKLM\...\BlueSprig_JetClean_is1) (Version: 1.5.0 - BlueSprig)
LAME v3.99.3 (for Windows) (HKLM\...\LAME_is1) (Version:  - )
Microsoft .NET Framework 4 Client Profile (HKLM\...\Microsoft .NET Framework 4 Client Profile) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4 Extended (HKLM\...\Microsoft .NET Framework 4 Extended) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319 - Microsoft Corporation) Hidden
Microsoft Application Error Reporting (Version: 12.0.6012.5000 - Microsoft Corporation) Hidden
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{7299052b-02a4-4627-81f2-1818da5d550d}) (Version: 8.0.56336 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (HKLM\...\{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}) (Version: 9.0.21022 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.21005 (HKLM\...\{ce085a78-074e-4823-8dc1-8a721b94b76d}) (Version: 12.0.21005.1 - Microsoft Corporation)
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (Version: 12.0.21005 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (Version: 12.0.21005 - Microsoft Corporation) Hidden
Microsoft Visual F# 2.0 Runtime (HKLM\...\{729A3000-BC8A-3B74-BA5D-5068FE12D70C}) (Version: 10.0.30319 - Microsoft Corporation)
Microsoft Visual Studio 2010 Tools for Office Runtime (x86) (HKLM\...\Microsoft Visual Studio 2010 Tools for Office Runtime (x86)) (Version: 10.0.50903 - Microsoft Corporation)
Microsoft Visual Studio 2010 Tools for Office Runtime (x86) (Version: 10.0.50908 - Microsoft Corporation) Hidden
Microsoft WSE 3.0 Runtime (HKLM\...\{E3E71D07-CD27-46CB-8448-16D4FB29AA13}) (Version: 3.0.5305.0 - Microsoft Corp.)
Modio (HKLM\...\{3DA224A5-666B-4941-8998-2F19C6D126A5}_is1) (Version:  - GameTuts)
Morpheus Music (HKLM\...\Morpheus Music) (Version: 7.4.0.0 - DevHancer LLC)
Morrowind (HKLM\...\{055A1919-3BBA-4BD5-8B3C-3851879AC185}) (Version:  - )
Movie Maker (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
MSVCRT (Version: 15.4.2862.0708 - Microsoft) Hidden
MSVCRT110 (Version: 16.4.1108.0727 - Microsoft) Hidden
NaturalReaderFree (HKLM\...\{262EFBD9-A907-490F-81F4-561FDD3A8C5C}) (Version: 1.00.0000 - Naturalsoft limited)
NVIDIA Control Panel 307.83 (Version: 307.83 - NVIDIA Corporation) Hidden
NVIDIA Graphics Driver 307.83 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver) (Version: 307.83 - NVIDIA Corporation)
NVIDIA Install Application (Version: 2.1002.109.706 - NVIDIA Corporation) Hidden
NVIDIA Update 1.10.8 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Update) (Version: 1.10.8 - NVIDIA Corporation)
NVIDIA Update Components (Version: 1.10.8 - NVIDIA Corporation) Hidden
Opera Stable 26.0.1656.60 (HKLM\...\Opera 26.0.1656.60) (Version: 26.0.1656.60 - Opera Software ASA)
Origin (HKLM\...\Origin) (Version: 9.4.20.386 - Electronic Arts, Inc.)
PeerBlock 1.1+ (r691) (HKLM\...\{015C5B35-B678-451C-9AEE-821E8D69621C}_is1) (Version: 1.1.0.691 - PeerBlock, LLC)
Photo Gallery (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
SoundMAX (HKLM\...\{F0A37341-D692-11D4-A984-009027EC0A9C}) (Version: 6.10.1.5491 - Analog Devices)
System Requirements Lab CYRI (HKLM\...\{1110A014-1471-4B66-BFDC-E8EED120CC59}) (Version: 6.0.20.0 - Husdawg, LLC)
Terrordrome The Game (HKCU\...\Terrordrome The Game) (Version:  - )
TES Construction Set (HKLM\...\{605333A6-963F-480C-A358-1301CAA6CFF6}) (Version:  - )
The Sims™ 3 (HKLM\...\{C05D8CDB-417D-4335-A38C-A0659EDFD6B8}) (Version: 1.0.615 - Electronic Arts)
Unity Web Player (HKCU\...\UnityWebPlayer) (Version: 4.5.1f3 - Unity Technologies ApS)
Update for Microsoft .NET Framework 4 Client Profile (KB2836939v3) (HKLM\...\{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2836939v3) (Version: 3 - Microsoft Corporation)
Update for Microsoft .NET Framework 4 Extended (KB2836939v3) (HKLM\...\{0A0CADCF-78DA-33C4-A350-CD51849B9702}.KB2836939v3) (Version: 3 - Microsoft Corporation)
Ventrilo Client (HKLM\...\{789289CA-F73A-4A16-A331-54D498CE069F}) (Version: 3.0.8 - Flagship Industries, Inc.)
VLC media player (HKLM\...\VLC media player) (Version: 2.1.5 - VideoLAN)
Windows Live Communications Platform (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live Essentials (HKLM\...\WinLiveSuite) (Version: 16.4.3528.0331 - Microsoft Corporation)
Windows Live Essentials (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live ID Sign-in Assistant (Version: 7.250.4311.0 - Microsoft Corporation) Hidden
Windows Live Installer (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live Photo Common (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live PIMT Platform (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live SOXE (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live SOXE Definitions (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live UX Platform (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
Windows Live UX Platform Language Pack (Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
 
========================= Memory info: ===================================
 
Percentage of memory in use: 51%
Total physical RAM: 1982.43 MB
Available physical RAM: 971.02 MB
Total Pagefile: 3964.86 MB
Available Pagefile: 2948.08 MB
Total Virtual: 2047.88 MB
Available Virtual: 1954.27 MB
 
========================= Partitions: =====================================
 
1 Drive c: (Windows) (Fixed) (Total:229.86 GB) (Free:88.02 GB) NTFS
 
========================= Users: ========================================
 
User accounts for \\MIKECHIPS-PC
 
Administrator            Guest                    Mike Chips               
UpdatusUser              
 
 
**** End of log ****


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.4.1 (12.28.2014:1)
OS: Windows 7 Home Premium x86
Ran by Mike Chips on Sun 01/18/2015 at 19:42:25.88
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3C5E4AFF-F672-4EC8-BC81-CF5466A97AAA}
 
 
 
~~~ Files
 
Successfully deleted: [File] "C:\Windows\wininit.ini"
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] "C:\Program Files\bearshare applications"
Successfully deleted: [Folder] "C:\Program Files\eusing free registry cleaner"
Successfully deleted: [Folder] "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\free registry cleaner"
Successfully deleted: [Folder] "C:\Windows\system32\ai_recyclebin"
 
 
 
~~~ Event Viewer Logs were cleared
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 01/18/2015 at 19:44:32.05
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


# AdwCleaner v4.108 - Report created 18/01/2015 at 19:49:04
# Updated 17/01/2015 by Xplode
# Database : 2015-01-18.1 [Live]
# Operating System : Windows 7 Home Premium Service Pack 1 (32 bits)
# Username : Mike Chips - MIKECHIPS-PC
# Running from : C:\Users\Mike Chips\Desktop\adwcleaner_4.108.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\ProgramData\NCH Software
Folder Deleted : C:\Users\Mike Chips\AppData\Local\CrashRpt
File Deleted : C:\Users\Mike Chips\AppData\Roaming\Opera Software\Opera Stable\Local Storage\hxxp_www.azlyrics.com_0.localstorage
File Deleted : C:\Users\Mike Chips\AppData\Roaming\Opera Software\Opera Stable\Local Storage\hxxp_services.hearstmags.com_0.localstorage
File Deleted : C:\Users\Mike Chips\AppData\Roaming\Opera Software\Opera Stable\Local Storage\hxxp_static.audienceinsights.net_0.localstorage
 
***** [ Scheduled Tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKLM\SOFTWARE\Classes\AppID\DiscoveryHelper.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\GIFAnimator.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\IMTrProgress.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\IMWeb.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\Launcher.EXE
Key Deleted : HKLM\SOFTWARE\Classes\AppID\WMHelper.DLL
Key Deleted : HKLM\SOFTWARE\Classes\DiscoveryHelper.iMesh6Discovery
Key Deleted : HKLM\SOFTWARE\Classes\DiscoveryHelper.iMesh6Discovery.1
Key Deleted : HKLM\SOFTWARE\Classes\imweb.imwebcontrol
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1FC41815-FA4C-4F8B-B143-2C045C8EA2FC}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{21493C1F-D071-496A-9C27-450578888291}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{403A885F-CB00-40C1-BDC1-EB09053194F7}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{55C1727F-5535-4C2A-9601-8C2458608B48}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{756C097C-6BDB-45DE-A8F1-83E01AB86BA4}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{A7DDCBDE-5C86-415C-8A37-763AE183E7E4}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{27BF8F8D-58B8-D41C-F913-B7EEB57EF6F6}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BF72F68-72D8-461D-A884-329D936C5581}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{78E9D883-93CD-4072-BEF3-38EE581E2839}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{83AC1413-FCE4-4A46-9DD5-4F31F306E71F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B6F8DA9F-2696-419E-A8A3-19BE41EF51BD}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B37B4BA6-334E-72C1-B57E-6AFE8F8A5AF3}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B77AD4AC-C1C2-B293-7737-71E13A11FFEA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{CA1CE38C-F04C-471F-B9F3-083C58165C10}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E773F2CF-5E6E-FF2B-81A1-AC581A26B2B2}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{403A885F-CB00-40C1-BDC1-EB09053194F7}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{55C1727F-5535-4C2A-9601-8C2458608B48}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{96F7FABC-5789-EFA4-B6ED-1272F4C1D27B}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C4C4F1F4-3074-4CB6-9FB8-0A64273166F0}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7C3B01BC-53A5-48A0-A43B-0C67731134B9}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{872F3C0B-4462-424C-BB9F-74C6899B9F92}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{B6F8DA9F-2696-419E-A8A3-19BE41EF51BD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0ABE0FED-50E7-4E42-A125-57C0A11DBCDE}
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.17496
 
 
-\\ Google Chrome v39.0.2171.99
 
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://search.aol.com/aol/search?q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=HIP&o=102874&locale=en_US&apn_uid=6b8616a3-f056-45d7-b8eb-5539c2626238&apn_ptnrs=%5E6E&apn_sauid=579F332C-EDA0-45FA-AB15-1D523FCEEF54&apn_dtid=%5EYYYYYY%5EYY%5EUS&q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=HIP&o=102874&locale=en_US&apn_uid=6b8616a3-f056-45d7-b8eb-5539c2626238&apn_ptnrs=%5E6E&apn_sauid=579F332C-EDA0-45FA-AB15-1D523FCEEF54&apn_dtid=%5EYYYYYY%5EYY%5EUS&q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://slirsredirect.search.aol.com/slirs_hxxp/sredir?sredir=2706&query={searchTerms}&invocationType=tb50trie7
 
-\\ Opera v26.0.1656.60
 
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://search.aol.com/aol/search?q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=HIP&o=102874&locale=en_US&apn_uid=6b8616a3-f056-45d7-b8eb-5539c2626238&apn_ptnrs=%5E6E&apn_sauid=579F332C-EDA0-45FA-AB15-1D523FCEEF54&apn_dtid=%5EYYYYYY%5EYY%5EUS&q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=HIP&o=102874&locale=en_US&apn_uid=6b8616a3-f056-45d7-b8eb-5539c2626238&apn_ptnrs=%5E6E&apn_sauid=579F332C-EDA0-45FA-AB15-1D523FCEEF54&apn_dtid=%5EYYYYYY%5EYY%5EUS&q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}
[C:\Users\Mike Chips\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://slirsredirect.search.aol.com/slirs_hxxp/sredir?sredir=2706&query={searchTerms}&invocationType=tb50trie7
 
*************************
 
AdwCleaner[R0].txt - [1939 octets] - [13/10/2014 18:20:51]
AdwCleaner[R1].txt - [5153 octets] - [18/01/2015 19:46:52]
AdwCleaner[S0].txt - [2128 octets] - [13/10/2014 18:26:03]
AdwCleaner[S1].txt - [6363 octets] - [18/01/2015 19:49:04]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [6423 octets] ##########


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * 
 
Adware Removal Tool v3.9
Time: 2015_01_18_19_53_05
OS: Windows 7 - 32 Bit
Account Name: Mike Chips
U0L0S11
 
\\\\\\\\\\\\\\\\\\\\\\\ Repair Logs \\\\\\\\\\\\\\\\\\\\\\
 
Deleted - RegistryValueData - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{2A0F3D1B-0909-4FF4-B272-609CCE6054E7}:dllname
Deleted - RegistryValueData - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{2A0F3D1B-0909-4FF4-B272-609CCE6054E7}:masterclsid
Deleted - RegistryValueData - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{2EECD738-5844-4A99-B4B6-146BF802613B}:dllname
Deleted - RegistryValueData - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{472734EA-242A-422B-ADF8-83D1E48CC825}:dllname
Deleted - RegistryValueData - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E}:dllname
Deleted - RegistryValueData - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{98889811-442D-49DD-99D7-DC866BE87DBC}:dllname
Deleted - RegistryKey - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility:{2A0F3D1B-0909-4FF4-B272-609CCE6054E7}
Deleted - RegistryKey - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility:{2EECD738-5844-4A99-B4B6-146BF802613B}
Deleted - RegistryKey - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility:{472734EA-242A-422B-ADF8-83D1E48CC825}
Deleted - RegistryKey - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility:{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E}
Deleted - RegistryKey - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility:{98889811-442D-49DD-99D7-DC866BE87DBC}
 
\\ Finished


Malwarebytes Anti-Rootkit BETA 1.08.2.1001
www.malwarebytes.org
 
Database version: v2015.01.18.12
 
Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 11.0.9600.17501
Mike Chips :: MIKECHIPS-PC [administrator]
 
1/18/2015 8:00:56 PM
mbar-log-2015-01-18 (20-00-56).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 340224
Time elapsed: 24 minute(s), 32 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)


---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.08.2.1001
 
© Malwarebytes Corporation 2011-2012
 
OS version: 6.1.7601 Windows 7 Service Pack 1 x86
 
Account is Administrative
 
Internet Explorer version: 11.0.9600.17501
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED
CPU speed: 2.004000 GHz
Memory total: 2078728192, free: 1165144064
 
Downloaded database version: v2015.01.18.12
Downloaded database version: v2015.01.14.01
Downloaded database version: v2014.12.06.01
=======================================
Initializing...
------------ Kernel report ------------
     01/18/2015 20:00:36
------------ Loaded modules -----------
\SystemRoot\system32\ntkrnlpa.exe
\SystemRoot\system32\halmacpi.dll
\SystemRoot\system32\kdcom.dll
\SystemRoot\system32\mcupdate_AuthenticAMD.dll
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\system32\CLFS.SYS
\SystemRoot\system32\CI.dll
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\ACPI.sys
\SystemRoot\system32\drivers\WMILIB.SYS
\SystemRoot\system32\drivers\msisadrv.sys
\SystemRoot\system32\drivers\pci.sys
\SystemRoot\system32\drivers\vdrvroot.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\system32\drivers\nvstor.sys
\SystemRoot\system32\drivers\storport.sys
\SystemRoot\system32\drivers\amdxata.sys
\SystemRoot\system32\drivers\fltmgr.sys
\SystemRoot\system32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\Ntfs.sys
\SystemRoot\System32\Drivers\msrpc.sys
\SystemRoot\System32\Drivers\ksecdd.sys
\SystemRoot\System32\Drivers\cng.sys
\SystemRoot\System32\drivers\pcw.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\drivers\volsnap.sys
\SystemRoot\System32\Drivers\spldr.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\System32\drivers\hwpolicy.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\system32\drivers\disk.sys
\SystemRoot\system32\drivers\CLASSPNP.SYS
\SystemRoot\system32\DRIVERS\cdrom.sys
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\drivers\VIDEOPRT.SYS
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\system32\drivers\rdpencdd.sys
\SystemRoot\system32\drivers\rdprefmp.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\DRIVERS\wfplwf.sys
\SystemRoot\system32\DRIVERS\pacer.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\system32\DRIVERS\serial.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\system32\DRIVERS\termdd.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\system32\DRIVERS\mssmbios.sys
\??\C:\Windows\System32\drivers\GUBootStartup.sys
\SystemRoot\System32\drivers\discache.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\blbdrive.sys
\SystemRoot\system32\DRIVERS\tunnel.sys
\SystemRoot\system32\DRIVERS\amdk8.sys
\SystemRoot\system32\DRIVERS\b57nd60x.sys
\SystemRoot\system32\DRIVERS\nvlddmkm.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\dxgmms1.sys
\SystemRoot\system32\DRIVERS\usbohci.sys
\SystemRoot\system32\DRIVERS\USBPORT.SYS
\SystemRoot\system32\DRIVERS\usbehci.sys
\SystemRoot\system32\DRIVERS\HDAudBus.sys
\SystemRoot\system32\DRIVERS\serenum.sys
\SystemRoot\system32\DRIVERS\parport.sys
\SystemRoot\system32\DRIVERS\CompositeBus.sys
\SystemRoot\system32\DRIVERS\AgileVpn.sys
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\rassstp.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\DRIVERS\mcdbus.sys
\SystemRoot\system32\DRIVERS\SCSIPORT.SYS
\SystemRoot\system32\DRIVERS\swenum.sys
\SystemRoot\system32\DRIVERS\ks.sys
\SystemRoot\system32\DRIVERS\umbus.sys
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\drivers\HdAudio.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\Drivers\dump_diskdump.sys
\SystemRoot\System32\Drivers\dump_nvstor.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\system32\DRIVERS\hidusb.sys
\SystemRoot\system32\DRIVERS\HIDCLASS.SYS
\SystemRoot\system32\DRIVERS\HIDPARSE.SYS
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\DRIVERS\mouhid.sys
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\system32\DRIVERS\kbdhid.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\system32\DRIVERS\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\drivers\WudfPf.sys
\SystemRoot\system32\DRIVERS\lltdio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\system32\DRIVERS\parvdm.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\Drivers\secdrv.SYS
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\system32\DRIVERS\asyncmac.sys
\??\C:\Windows\system32\drivers\mbamchameleon.sys
\??\C:\Windows\system32\drivers\MBAMSwissArmy.sys
\Windows\System32\ntdll.dll
\Windows\System32\smss.exe
\Windows\System32\apisetschema.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xffffffff857f3210
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\00000053\
Lower Device Object: 0xffffffff851219d0
Lower Device Driver Name: \Driver\nvstor\
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffffff857f3210, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff857f4020, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff857f3210, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xffffffff84859700, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffffff851219d0, DeviceName: \Device\00000053\, DriverName: \Driver\nvstor\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
Done!
Drive 0
This is a System drive
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 3E5007F9
 
Partition information:
 
    Partition 0 type is Other (0x27)
    Partition is ACTIVE.
    Partition starts at LBA: 2048  Numsec = 6338560
    Partition file system is NTFS
    Partition is bootable
 
    Partition 1 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 6340608  Numsec = 482054144
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
Disk Size: 250059350016 bytes
Sector size: 512 bytes
 
Done!
Scan finished
=======================================
 
 
Removal queue found; removal started
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-0-i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\VBR-0-0-2048-i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-0-r.mbam...
Removal finished


 Results of screen317's Security Check version 0.99.93  
 Windows 7 Service Pack 1 x86 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
 Windows Firewall Disabled!  
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
 CCleaner     
 Java 8 Update 25  
 Java version 32-bit out of Date!
 Adobe Flash Player 16.0.0.257  
 Adobe Reader XI  
 Google Chrome (39.0.2171.95) 
 Google Chrome (39.0.2171.99) 
````````Process Check: objlist.exe by Laurent````````
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 0% 
````````````````````End of Log``````````````````````


PC seems not as sluggish but still slow in areas.

Edited by Steelers2025, 18 January 2015 - 08:33 PM.


#6 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 18 January 2015 - 08:39 PM

Download 9-Lab Removal Tool. from one of the links below.

CLICK HERE to determine whether you're running 32-bit or 64-bit for Windows.
 

Install the program onto your computer, then right click the icon RRXH2ZG.jpg run as administrator.

Go to the Update tab and update the program.

ZT1y9rP.png

Now go to the scanner tab and select Full Scan.

k68m97f.png

Upon Scan Completion Click Show Results.

FihDIFx.png

Now click the Clean button.

eCCJKcA.png

Once done cleaning you can go to the logs tab double click it and copy paste in your next reply.



#7 Steelers2025

Steelers2025
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 18 January 2015 - 09:50 PM

9-lab Removal Tool 1.0.0.25 BETA
9-lab.com
 
Database version: 93.27808
 
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Internet Explorer 9.11.9600.17501
Mike Chips :: MIKECHIPS-PC not implemented yet
 
1/18/2015 9:26:11 PM
9lab-log-2015-01-18 (21-26-11).txt
 
Scan type: 
Objects scanned: 21166
Time Elapsed: 22 m 4 s
 
Registry Keys detected: 8
Virtool.RPL.Gen.bot [\software\microsoft\windows\currentversion\internet settings\zonemap\domains\mirarsearch.com]
Virtool.RPL.Gen.bot [\software\microsoft\windows\currentversion\internet settings\zonemap\domains\getmirar.com]
Risk.RPL.Gen.vb [\software\bearshare]
Risk.RPL.Gen.vb [\software\classes\appid\bearshare.exe]
Virtool.RPL.Gen.vb [\software\gigaclicks]
Virtool.RPL.Gen.vb [\software\gigaclicks]
Virtool.RPL.Gen.vb [\software\classes\typelib\{82351433-9094-11d1-a24b-00a0c932c7df}]
Virtool.RPL.Gen.vb [\software\classes\clsid\{82351441-9094-11d1-a24b-00a0c932c7df}]
 
 
Files detected: 76
Virtool.RPL.Gen.bot [\software\microsoft\windows\currentversion\internet settings\zonemap\domains\mirarsearch.com]
Virtool.RPL.Gen.bot [\software\microsoft\windows\currentversion\internet settings\zonemap\domains\getmirar.com]
Risk.RPL.Gen.vb [\software\bearshare]
Risk.RPL.Gen.vb [\software\classes\appid\bearshare.exe]
Virtool.RPL.Gen.vb [\software\gigaclicks]
Virtool.RPL.Gen.vb [\software\gigaclicks]
Virtool.RPL.Gen.vb [\software\classes\typelib\{82351433-9094-11d1-a24b-00a0c932c7df}]
Virtool.RPL.Gen.vb [\software\classes\clsid\{82351441-9094-11d1-a24b-00a0c932c7df}]
Rootkit.PL.Gen.bot [c:\windows\system32\MSWINSCK.OCX]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Creatives.xml]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\10.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1040.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1043.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1044.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1050.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1054.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1055.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1057.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1058.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1060.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1062.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1063.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\1070.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\11.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\12.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\13.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\14.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\15.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\16.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\17.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\18.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\19.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\2.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\20.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\21.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\22.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\23.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\24.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\25.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\26.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\27.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\28.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\29.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\3.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\30.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\31.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\32.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\33.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\34.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\35.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\36.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\37.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\38.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\4.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\5.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\6.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\7.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\8.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\CreativesFiles\9.gif]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\Albums.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\Artists.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\BitTorrent.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\Cddb.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\ContentDirs.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\ContentFile.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\DownloadFile.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\PartsHashes.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\Playlists.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\rjn.a92]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\StreamingFiles.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Data\VirtualFile.db]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Partials\2809dc04-soundtrack.html]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Partials\SelectMatches.html]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Player.swf]
Risk.FPL.Gen.vb [c:\users\mike chips\appdata\local\BearShare\Statistics.xml]
Virtool.FPL.Gen.vb [c:\programdata\SpeedBit\sbhe.js]
Mal/Fraud!se-1570 [C:\Program Files\Huracan Studio\Terrordrome The Game\Terrordrome_Final.exe]
Mal/Fraud!se-1570 [C:\Users\Mike Chips\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Terrordrome The Game\Terrordrome The Game.lnk]
Rootkit.Win32.Gen.vb!s2 [C:\Users\Mike Chips\Desktop\Arena106.exe]
Malware.Win32.Gen.sm!s1 [C:\Users\Mike Chips\Desktop\Groove Games\Land Of The Dead\System\Editor.dll]
Malware.Win32.Gen.sm!s1 [C:\Users\Mike Chips\Desktop\Groove Games\Land Of The Dead\System\Fire.dll]
Mal/Fraud!se-1570 [C:\Users\Mike Chips\Desktop\Terrordrome The Game.lnk]
Malware.Win32.Gen.sm!s2 [C:\Users\Mike Chips\Downloads\MiniToolBox.exe]


#8 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 18 January 2015 - 10:08 PM

Alright one more scan please. :)

 

 

Disable your antivirus prior to running this scan.

 

 

 esetonlinebtn.png

 

  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
  • Scan potentially unwanted applications
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.


#9 Steelers2025

Steelers2025
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 19 January 2015 - 01:50 AM

C:\Program Files\Adware-Removal-Tool\ARTP3.exe MSIL/FakeTool.PS trojan cleaned by deleting - quarantined
C:\Users\Mike Chips\Documents\update1.exe Win32/DownWare.L potentially unwanted application deleted - quarantined


#10 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 19 January 2015 - 01:51 AM

How is your computer running now?

#11 Steelers2025

Steelers2025
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 19 January 2015 - 02:14 AM

seems fine so far the Svchost is not crazy high rite now.



#12 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 19 January 2015 - 02:21 AM

Have a good day. :guitar:

 

Update your Java Software

 

You do not have an antivirus installed, I highly suggest  360 Total Security it is free, and better than most paid antivirus apps with no system slowdown.

 

 

Download System Ninja To remove junk files from your machine. Get the portable version, it must be ran from inside the folder.

TooWiz Smart Defrag Obviously to defrag.

Qualys BrowserCheck To update plugins.

Safe Browsing Tool Web of trust to keep away from shady sites.

Unchecky  To avoid bundled software.

Adblock Plus  To browse the web ad free.

Malwarebytes Anti-Exploit To block Zero day attacks.

Malwarebytes | StartUpLITE To disable un-needed start ups.

 

 

 

Download DelFix by "Xplode" to your Desktop.
Right Click the tool and Run as Admin ( Xp Users Double Click)
Put a check mark next the items below:


Remove disinfection tools
Create registry backup
Purge System Restore




Now click on "Run" button.
***ow the program to complete its work.
*** the tools we used will be removed.
Tool will create and open a log report (DelFix.txt)
Note: The report can be located at the following location C:\DelFix.txt


Edited by InadequateInfirmity, 19 January 2015 - 02:25 AM.


#13 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 19 January 2015 - 02:49 AM

By the way on the 9-Lab quarantine tab, you can restore these files.

 

Mal/Fraud!se-1570 [C:\Program Files\Huracan Studio\Terrordrome The Game\Terrordrome_Final.exe]
Mal/Fraud!se-1570 [C:\Users\Mike Chips\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Terrordrome The Game\Terrordrome The Game.lnk]
Malware.Win32.Gen.sm!s1 [C:\Users\Mike Chips\Desktop\Groove Games\Land Of The Dead\System\Editor.dll]
Malware.Win32.Gen.sm!s1 [C:\Users\Mike Chips\Desktop\Groove Games\Land Of The Dead\System\Fire.dll]
Mal/Fraud!se-1570 [C:\Users\Mike Chips\Desktop\Terrordrome The Game.lnk]

 

I would personaly scan each one at  Jotti's malware scan first.

 

C:\Program Files\Huracan Studio\Terrordrome The Game\Terrordrome_Final.exe

C:\Users\Mike Chips\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Terrordrome The Game\Terrordrome The Game.lnk

C:\Users\Mike Chips\Desktop\Groove Games\Land Of The Dead\System\Editor.dll

C:\Users\Mike Chips\Desktop\Groove Games\Land Of The Dead\System\Fire.dll

C:\Users\Mike Chips\Desktop\Terrordrome The Game.lnk

 

 

 

The rest of the detections from 9-Lab appear to be malware.

 

Happy Surfing. :)


Edited by InadequateInfirmity, 19 January 2015 - 03:04 AM.


#14 Steelers2025

Steelers2025
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:10:58 PM

Posted 19 January 2015 - 12:37 PM

Thank You



#15 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:58 PM

Posted 19 January 2015 - 12:46 PM

:thumbup2:






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users