Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I don't believe it!


  • Please log in to reply
12 replies to this topic

#1 Lintle1234

Lintle1234

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 29 January 2018 - 09:50 AM

Hi all,

 

this is my first post and I hope to obey all the rules - there's quite a bit of reading on the intro to the site.

 

 

I have a 64 bit Packard Bell PC running Windows 10 Home 32 bit OS. I use Windows Defender for security. I also carry out regular scans using Malwarebytes Free, Windows Defender and Glarysoft's Malware Hunter.

 

For a while now Malware Hunter has been highlighting serious infections on my machine - and only Malware Hunter. Neither Malwarebytes nor Defender ever find anything, and this is on full system scans. Furthermore, Malware Hunter is unable to remove the infections it supposedly finds. And lastly, the logs it produces do not report the supposed infections.

 

I have contacted Glarysoft support on this but have experienced difficulties with getting their requests for copies of the actual infected objects to them as a number of them are Microsoft .exe files which are prevented being uploaded by various upload software owing to the .exe suffix.

 

My PC has not given indication of infection in any way, be it pop-ups, slow running or strange behaviours.

 

So, I mistrust Malware Hunter but would appreciate it if anyone has had the same experience and/or can shed any light on this situation.

 

I can forward log(s) if required and give further machine details but would firstly be interested in your members' responses.

 

 

Thank you.



BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:57 PM

Posted 30 January 2018 - 01:51 PM

Hi, run these too, please.

MiniToolBox
  • Please download MiniToolBox, save it to your desktop and run it.
  • Checkmark the following checkboxes:
    • Flush DNS
    • Report IE Proxy Settings
    • Reset IE Proxy Settings
    • Report FF Proxy Settings
    • Reset FF Proxy Settings
    • List content of Hosts
    • List IP conf[iguration
    • List Winsock Entries
    • List last 10 Event Viewer log
    • List Installed Programs
    • List Users, Partitions and Memory size.
  • Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run. Note: When using "Reset FF Proxy Settings" option Firefox should be closed.
SXvL3ZF.pngTDSSKiller
  • Download TDSSKiller and save it to your desktop.
  • Extract (unzip) its contents to your desktop.
  • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is required, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
zcMPezJ.pngAdwCleaner
  • Please download AdwCleaner by Xplode and save to your Desktop.
  • Double click on AdwCleaner.exe to run the tool. Vista/Windows 7/8 users right-click and select Run As Administrator
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
And finally I'd like us to scan your machine with ESET OnlineScan:
  • It is recommended to turn off your antivirus program. Click on the E5rfZI9.png button to see which antivirus is currently enabled:
c4VVzVO.png
  • Turn off your antivirus program. See here how to do this.
  • Check the option beside: Enable detection of potentially unwanted applications.
  • Now click on Advanced Settings and make sure that the option Clean threats automatically is NOT checked, and select the following:
Enable detection of potentially unsafe applications
Enable detection of suspicious applications
Scan archives
Enable Anti-Stealth Technology
  • Click on the Change button and select only Operating memory, Autostart locations and drive C:\ to be scanned.
yKulboi.jpg
  • Push the dtoGjAL.png button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
8L8IBHJ.png
  • When the scan completes a list of found threats will open automatically (if any malicious files are found).
imxEgHt.png
  • Push thecRhRYZ8.png button and save the file to your desktop using a unique name, such as ESETScan.txt. Include the contents of this report in your next reply.
  • Push the 9IjfdXq.png button.
  • Check the box beside RHzfZB1.png to uninstall the application when closed.
  • Push Vc3btaC.png and the close the application clicking the X in upper right corner.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Lintle1234

Lintle1234
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 31 January 2018 - 10:07 AM

Hi boopme,
 
Thank you for the reply. The TDSSKiller scan did not find anything and so did not create a report. Also, ESETscan shows four potentially unsafe programs although I'm sure it stated five at completion. Two of these programs are Magicjellybean which I believe I installed - as you will probably know it retrieves the OS product key. The other three are Glarysoft, which I use to clean up temp files, etc. Ironically, it is Malware Hunter that highlighted approximately 18 serious threats on my PC (which it couldn't remove) and that software is made by Glarysoft. Lastly, all the modules it identified were parts of the OS.

 

I could not find any way to attach the reports. Is it considered safe enough to paste the reports directly into my post? Is it possible to send the reports "for your eyes only"?

 

 

Thanks,

Lintle1234



#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:57 PM

Posted 31 January 2018 - 10:25 AM

Ok they are Ok. You need to copy/paste the results.. Nothing is personally identifiable.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Lintle1234

Lintle1234
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 02 February 2018 - 05:34 AM

Hi boopme,
 
Here are the reports.
 
Thank you.
 
 
 
 
# AdwCleaner 7.0.7.0 - Logfile created on Wed Jan 31 11:09:18 2018
# Updated on 2018/18/01 by Malwarebytes
# Database: 01-30-2018.2
# Running on Windows 10 Home (X86)
# Mode: scan
# Support: https://www.malwarebytes.com/support
***** [ Services ] *****
No malicious services found.
***** [ Folders ] *****
No malicious folders found.
***** [ Files ] *****
No malicious files found.
***** [ DLL ] *****
No malicious DLLs found.
***** [ WMI ] *****
No malicious WMI found.
***** [ Shortcuts ] *****
No malicious shortcuts found.
***** [ Tasks ] *****
No malicious tasks found.
***** [ Registry ] *****
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\openspeedtest.com
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\solvusoft.com
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.solvusoft.com
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\openspeedtest.com
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\solvusoft.com
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.solvusoft.com
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Microsoft\Shared Tools\MSConfig\services
PUP.Optional.SofTonicAssistant, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\adobe-photoshop.en.softonic.com
PUP.Optional.SofTonicAssistant, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\en.softonic.com
PUP.Optional.SofTonicAssistant, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\softonic.com
PUP.Optional.SofTonicAssistant, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\adobe-photoshop.en.softonic.com
PUP.Optional.SofTonicAssistant, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\en.softonic.com
PUP.Optional.SofTonicAssistant, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\softonic.com
PUP.Optional.DriverAgent, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\download.driversupport.com
PUP.Optional.DriverAgent, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\driversupport.com
PUP.Optional.DriverAgent, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\download.driversupport.com
PUP.Optional.DriverAgent, [Key] - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\driversupport.com

***** [ Firefox (and derivatives) ] *****
No malicious Firefox entries.
***** [ Chromium (and derivatives) ] *****
No malicious Chromium entries.
*************************
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt ##########

 

 

 

C:\Program Files\Magical Jelly Bean\keyfinder.exe a variant of Win32/MagicalJellyBean.B potentially unsafe application 
C:\Users\Eric\Downloads\Glary_Utilities_v5.90.0.111 (1).exe Win32/UwS.GlaryUtilities.A application 
C:\Users\Eric\Downloads\Glary_Utilities_v5.90.0.111.exe Win32/UwS.GlaryUtilities.A application 
C:\Users\Eric\Downloads\Glary_Utilities_v5.91.0.112.exe Win32/UwS.GlaryUtilities.A application 
Autostart locations a variant of Win32/MagicalJellyBean.B potentially unsafe application 
 

 

 

 

MiniToolBox by Farbar  Version: 17-06-2016
Ran by Eric (administrator) on 31-01-2018 at 10:48:44
Running from "C:\Users\Eric\Desktop"
Microsoft Windows 10 Home  (X86)
Model: 00000000000000000000000 Manufacturer: Packard Bell NEC
Boot Mode: Normal
***************************************************************************
========================= Flush DNS: ===================================
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
========================= IE Proxy Settings: ==============================
Proxy is not enabled.
No Proxy Server is set.
"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================
========================= IP Configuration: ================================
Realtek RTL8139/810x Family Fast Ethernet NIC = PLUSNET-72P2 (Connected)

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
reset
set global
set interface interface="Ethernet" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="PLUSNET-72P2" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Wireless Network Connection 3" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection* 1" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Wireless Network Connection 2" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection* 2" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Wireless Network Connection" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled

popd
# End of IPv4 configuration
 
Windows IP Configuration
   Host Name . . . . . . . . . . . . : Eric
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : lan
Ethernet adapter PLUSNET-72P2:
   Connection-specific DNS Suffix  . : lan
   Description . . . . . . . . . . . : Realtek RTL8139/810x Family Fast Ethernet NIC
   Physical Address. . . . . . . . . : 00-16-E6-10-5B-EB
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::3920:5206:48a4:7472%16(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.67(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Tuesday, January 30, 2018 4:45:19 PM
   Lease Expires . . . . . . . . . . : Thursday, February 1, 2018 10:41:04 AM
   Default Gateway . . . . . . . . . : 192.168.1.254
   DHCP Server . . . . . . . . . . . : 192.168.1.254
   DHCPv6 IAID . . . . . . . . . . . : 234886886
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-19-06-DF-9E-00-16-E6-10-5B-EB
   DNS Servers . . . . . . . . . . . : 192.168.1.254
   NetBIOS over Tcpip. . . . . . . . : Enabled
Tunnel adapter Teredo Tunneling Pseudo-Interface:
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:1c84:230d:3f57:febc(Preferred)
   Link-local IPv6 Address . . . . . : fe80::1c84:230d:3f57:febc%7(Preferred)
   Default Gateway . . . . . . . . . : ::
   DHCPv6 IAID . . . . . . . . . . . : 50331648
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-19-06-DF-9E-00-16-E6-10-5B-EB
   NetBIOS over Tcpip. . . . . . . . : Disabled
Server:  dsldevice.lan
Address:  192.168.1.254
Name:    google.com
Addresses:  2a00:1450:4009:810::200e
   216.58.201.46

Pinging google.com [216.58.206.110] with 32 bytes of data:
Reply from 216.58.206.110: bytes=32 time=9ms TTL=55
Reply from 216.58.206.110: bytes=32 time=12ms TTL=55
Ping statistics for 216.58.206.110:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 9ms, Maximum = 12ms, Average = 10ms
Server:  dsldevice.lan
Address:  192.168.1.254
Name:    yahoo.com
Addresses:  2001:4998:44:204::100d
   2001:4998:c:e33::53
   2001:4998:58:2201::73
   98.139.180.180
   98.138.252.38
   206.190.39.42

Pinging yahoo.com [98.139.180.180] with 32 bytes of data:
Reply from 98.139.180.180: bytes=32 time=86ms TTL=52
Reply from 98.139.180.180: bytes=32 time=86ms TTL=52
Ping statistics for 98.139.180.180:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 86ms, Maximum = 86ms, Average = 86ms
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
 16...00 16 e6 10 5b eb ......Realtek RTL8139/810x Family Fast Ethernet NIC
  1...........................Software Loopback Interface 1
  7...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.67     35
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
      192.168.1.0    255.255.255.0         On-link      192.168.1.67    291
     192.168.1.67  255.255.255.255         On-link      192.168.1.67    291
    192.168.1.255  255.255.255.255         On-link      192.168.1.67    291
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link      192.168.1.67    291
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link      192.168.1.67    291
===========================================================================
Persistent Routes:
  None
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  7    331 ::/0                     On-link
  1    331 ::1/128                  On-link
  7    331 2001::/32                On-link
  7    331 2001:0:4137:9e76:1c84:230d:3f57:febc/128
                                    On-link
 16    291 fe80::/64                On-link
  7    331 fe80::/64                On-link
  7    331 fe80::1c84:230d:3f57:febc/128
                                    On-link
 16    291 fe80::3920:5206:48a4:7472/128
                                    On-link
  1    331 ff00::/8                 On-link
 16    291 ff00::/8                 On-link
  7    331 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================
Catalog5 01 C:\WINDOWS\system32\napinsp.dll [54784] (Microsoft Corporation)
Catalog5 02 C:\WINDOWS\system32\pnrpnsp.dll [70656] (Microsoft Corporation)
Catalog5 03 C:\WINDOWS\system32\pnrpnsp.dll [70656] (Microsoft Corporation)
Catalog5 04 C:\WINDOWS\system32\NLAapi.dll [63488] (Microsoft Corporation)
Catalog5 05 C:\WINDOWS\system32\winrnr.dll [24064] (Microsoft Corporation)
Catalog5 06 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog5 07 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 02 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 03 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 04 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 05 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 06 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 07 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 08 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 09 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 10 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 11 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
Catalog9 12 C:\WINDOWS\system32\mswsock.dll [349752] (Microsoft Corporation)
========================= Event log errors: ===============================
Application errors:
==================
Error: (01/28/2018 06:21:40 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object.

Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol.
System Error:
Access is denied.
.
Error: (01/28/2018 05:47:21 PM) (Source: Application Error) (User: )
Description: Faulting application name: MicrosoftEdgeCP.exe, version: 11.0.16299.15, time stamp: 0x59cda307
Faulting module name: edgehtml.dll, version: 11.0.16299.192, time stamp: 0x23641bc9
Exception code: 0xcfffffff
Fault offset: 0x004e918d
Faulting process id: 0x11c0
Faulting application start time: 0xMicrosoftEdgeCP.exe0
Faulting application path: MicrosoftEdgeCP.exe1
Faulting module path: MicrosoftEdgeCP.exe2
Report Id: MicrosoftEdgeCP.exe3
Faulting package full name: MicrosoftEdgeCP.exe4
Faulting package-relative application ID: MicrosoftEdgeCP.exe5
Error: (01/28/2018 03:06:51 PM) (Source: Application Error) (User: )
Description: Faulting application name: mbamservice.exe, version: 3.1.0.595, time stamp: 0x59f74253
Faulting module name: mbamservice.exe, version: 3.1.0.595, time stamp: 0x59f74253
Exception code: 0xc0000005
Fault offset: 0x00149525
Faulting process id: 0x1cb8
Faulting application start time: 0xmbamservice.exe0
Faulting application path: mbamservice.exe1
Faulting module path: mbamservice.exe2
Report Id: mbamservice.exe3
Faulting package full name: mbamservice.exe4
Faulting package-relative application ID: mbamservice.exe5
Error: (01/28/2018 01:25:18 PM) (Source: Application Error) (User: )
Description: Faulting application name: RaMediaServer.exe, version: 1.0.0.2, time stamp: 0x4ff6bc03
Faulting module name: RaMediaServer.exe, version: 1.0.0.2, time stamp: 0x4ff6bc03
Exception code: 0xc0000005
Fault offset: 0x000dafdf
Faulting process id: 0xb08
Faulting application start time: 0xRaMediaServer.exe0
Faulting application path: RaMediaServer.exe1
Faulting module path: RaMediaServer.exe2
Report Id: RaMediaServer.exe3
Faulting package full name: RaMediaServer.exe4
Faulting package-relative application ID: RaMediaServer.exe5
Error: (01/27/2018 07:11:30 PM) (Source: Application Error) (User: )
Description: Faulting application name: RaMediaServer.exe, version: 1.0.0.2, time stamp: 0x4ff6bc03
Faulting module name: RaMediaServer.exe, version: 1.0.0.2, time stamp: 0x4ff6bc03
Exception code: 0xc0000005
Fault offset: 0x000dafdf
Faulting process id: 0xb5c
Faulting application start time: 0xRaMediaServer.exe0
Faulting application path: RaMediaServer.exe1
Faulting module path: RaMediaServer.exe2
Report Id: RaMediaServer.exe3
Faulting package full name: RaMediaServer.exe4
Faulting package-relative application ID: RaMediaServer.exe5
Error: (01/27/2018 12:38:53 PM) (Source: Application Error) (User: )
Description: Faulting application name: MalwareHunter.exe, version: 1.51.0.481, time stamp: 0x5a459e98
Faulting module name: CoreUIComponents.dll, version: 10.0.16299.15, time stamp: 0x2b1f332b
Exception code: 0xc0000602
Fault offset: 0x000eff75
Faulting process id: 0x134
Faulting application start time: 0xMalwareHunter.exe0
Faulting application path: MalwareHunter.exe1
Faulting module path: MalwareHunter.exe2
Report Id: MalwareHunter.exe3
Faulting package full name: MalwareHunter.exe4
Faulting package-relative application ID: MalwareHunter.exe5
Error: (01/27/2018 12:35:37 PM) (Source: Application Error) (User: )
Description: Faulting application name: MalwareHunter.exe, version: 1.51.0.481, time stamp: 0x5a459e98
Faulting module name: CoreUIComponents.dll, version: 10.0.16299.15, time stamp: 0x2b1f332b
Exception code: 0xc0000602
Fault offset: 0x000eff75
Faulting process id: 0x8e0
Faulting application start time: 0xMalwareHunter.exe0
Faulting application path: MalwareHunter.exe1
Faulting module path: MalwareHunter.exe2
Report Id: MalwareHunter.exe3
Faulting package full name: MalwareHunter.exe4
Faulting package-relative application ID: MalwareHunter.exe5
Error: (01/27/2018 12:22:39 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object.

Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol.
System Error:
Access is denied.
.
Error: (01/16/2018 03:05:43 PM) (Source: Application Error) (User: )
Description: Faulting application name: MalwareHunter.exe, version: 1.51.0.481, time stamp: 0x5a459e98
Faulting module name: CoreUIComponents.dll, version: 10.0.16299.15, time stamp: 0x2b1f332b
Exception code: 0xc0000602
Fault offset: 0x000eff75
Faulting process id: 0x414
Faulting application start time: 0xMalwareHunter.exe0
Faulting application path: MalwareHunter.exe1
Faulting module path: MalwareHunter.exe2
Report Id: MalwareHunter.exe3
Faulting package full name: MalwareHunter.exe4
Faulting package-relative application ID: MalwareHunter.exe5
Error: (01/16/2018 03:04:36 PM) (Source: Application Error) (User: )
Description: Faulting application name: MalwareHunter.exe, version: 1.51.0.481, time stamp: 0x5a459e98
Faulting module name: CoreUIComponents.dll, version: 10.0.16299.15, time stamp: 0x2b1f332b
Exception code: 0xc0000602
Fault offset: 0x000eff75
Faulting process id: 0x1914
Faulting application start time: 0xMalwareHunter.exe0
Faulting application path: MalwareHunter.exe1
Faulting module path: MalwareHunter.exe2
Report Id: MalwareHunter.exe3
Faulting package full name: MalwareHunter.exe4
Faulting package-relative application ID: MalwareHunter.exe5

System errors:
=============
Error: (01/31/2018 10:48:07 AM) (Source: DCOM) (User: NT AUTHORITY)
Description: {4991D34B-80A1-4291-83B6-3328366B9097}BITS
Error: (01/31/2018 10:44:35 AM) (Source: Service Control Manager) (User: )
Description: The Downloaded Maps Manager service terminated unexpectedly.  It has done this 1 time(s).
Error: (01/31/2018 10:41:10 AM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/31/2018 10:41:10 AM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/31/2018 10:41:10 AM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/31/2018 10:41:10 AM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/30/2018 10:57:31 PM) (Source: DCOM) (User: ERIC)
Description: application-specificLocalActivation{D63B10C5-BB46-4990-A94F-E40B9D520160}{9CA88EE3-ACB7-47C8-AFC4-AB702511C276}ERICEricS-1-5-21-354478703-3514034584-2126732561-1155LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/30/2018 04:45:22 PM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/30/2018 04:45:22 PM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable
Error: (01/30/2018 04:45:22 PM) (Source: DCOM) (User: NT AUTHORITY)
Description: application-specificLocalActivation{6B3B8D23-FA8D-40B9-8DBD-B950333E2C52}{4839DDB7-58C2-48F5-8283-E1D1807D0D7D}NT AUTHORITYLOCAL SERVICES-1-5-19LocalHost (Using LRPC)UnavailableUnavailable

Microsoft Office Sessions:
=========================
Error: (01/28/2018 06:21:40 PM) (Source: Microsoft-Windows-CAPI2)(User: )
Description:
Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol.
System Error:
Access is denied.
Error: (01/28/2018 05:47:21 PM) (Source: Application Error)(User: )
Description: MicrosoftEdgeCP.exe11.0.16299.1559cda307edgehtml.dll11.0.16299.19223641bc9cfffffff004e918d11c001d3985ed508daffC:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exeC:\WINDOWS\SYSTEM32\edgehtml.dll1e372da8-bf83-4a34-8ceb-601c524e92f7Microsoft.MicrosoftEdge_41.16299.15.0_neutral__8wekyb3d8bbweContentProcess
Error: (01/28/2018 03:06:51 PM) (Source: Application Error)(User: )
Description: mbamservice.exe3.1.0.59559f74253mbamservice.exe3.1.0.59559f74253c0000005001495251cb801d398499df0be90C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exeC:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe345e1726-a575-42da-9ad3-6f57986d850e
Error: (01/28/2018 01:25:18 PM) (Source: Application Error)(User: )
Description: RaMediaServer.exe1.0.0.24ff6bc03RaMediaServer.exe1.0.0.24ff6bc03c0000005000dafdfb0801d3983b6a566c9fC:\Program Files\Ralink\Common\RaMediaServer.exeC:\Program Files\Ralink\Common\RaMediaServer.exee546da87-1000-4786-b6d7-7156c9309932
Error: (01/27/2018 07:11:30 PM) (Source: Application Error)(User: )
Description: RaMediaServer.exe1.0.0.24ff6bc03RaMediaServer.exe1.0.0.24ff6bc03c0000005000dafdfb5c01d397a29e678b76C:\Program Files\Ralink\Common\RaMediaServer.exeC:\Program Files\Ralink\Common\RaMediaServer.exe872fec84-85e4-475a-b4c3-5b780b145989
Error: (01/27/2018 12:38:53 PM) (Source: Application Error)(User: )
Description: MalwareHunter.exe1.51.0.4815a459e98CoreUIComponents.dll10.0.16299.152b1f332bc0000602000eff7513401d3976b8481f266C:\Program Files\Glarysoft\Malware Hunter\MalwareHunter.exeC:\WINDOWS\System32\CoreUIComponents.dllf8f9006a-012d-45b7-b5cc-c52c7cd738d4
Error: (01/27/2018 12:35:37 PM) (Source: Application Error)(User: )
Description: MalwareHunter.exe1.51.0.4815a459e98CoreUIComponents.dll10.0.16299.152b1f332bc0000602000eff758e001d3975862d32103C:\Program Files\Glarysoft\Malware Hunter\MalwareHunter.exeC:\WINDOWS\System32\CoreUIComponents.dll9f83f443-50d0-49e8-888e-4e7e1819c1e0
Error: (01/27/2018 12:22:39 PM) (Source: Microsoft-Windows-CAPI2)(User: )
Description:
Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol.
System Error:
Access is denied.
Error: (01/16/2018 03:05:43 PM) (Source: Application Error)(User: )
Description: MalwareHunter.exe1.51.0.4815a459e98CoreUIComponents.dll10.0.16299.152b1f332bc0000602000eff7541401d38edb6c2c0661C:\Program Files\Glarysoft\Malware Hunter\MalwareHunter.exeC:\WINDOWS\System32\CoreUIComponents.dll0e7dcd6b-6be1-435d-b301-051a519f2d81
Error: (01/16/2018 03:04:36 PM) (Source: Application Error)(User: )
Description: MalwareHunter.exe1.51.0.4815a459e98CoreUIComponents.dll10.0.16299.152b1f332bc0000602000eff75191401d38edb347ad4d5C:\Program Files\Glarysoft\Malware Hunter\MalwareHunter.exeC:\WINDOWS\System32\CoreUIComponents.dll1e3f04ad-afad-4f46-aef0-7a92b9a891d0

CodeIntegrity Errors:
===================================
  Date: 2018-01-31 10:45:38.145
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:45:38.138
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:44:07.794
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:44:07.716
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:41:06.825
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:41:06.784
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:41:06.772
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-31 10:41:06.757
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-30 22:30:20.728
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.
  Date: 2018-01-30 22:30:20.724
  Description: Code Integrity determined that a process (\Device\HarddiskVolume2\Windows\System32\svchost.exe) attempted to load \Device\HarddiskVolume2\Program Files\Bonjour\mdnsNSP.dll that did not meet the Microsoft signing level requirements.

=========================== Installed Programs ============================
32 Bit HP CIO Components Installer (HKLM\...\{A80FA752-C491-4ED9-ABF0-4278563160B2}) (Version: 7.1.8 - Hewlett-Packard) Hidden
Adobe Acrobat Reader DC (HKLM\...\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}) (Version: 18.009.20050 - Adobe Systems Incorporated)
Adobe AIR (HKLM\...\{10166660-0C51-4355-BD74-D4700EFDB83B}) (Version: 28.0.0.127 - Adobe Systems Incorporated) Hidden
Adobe AIR (HKLM\...\Adobe AIR) (Version: 28.0.0.127 - Adobe Systems Incorporated)
Adobe Flash Player 28 NPAPI (HKLM\...\Adobe Flash Player NPAPI) (Version: 28.0.0.137 - Adobe Systems Incorporated)
Adobe Refresh Manager (HKLM\...\{AC76BA86-0804-1033-1959-001824147215}) (Version: 1.8.0 - Adobe Systems Incorporated) Hidden
Avanquest update (HKLM\...\{76E41F43-59D2-4F30-BA42-9A762EE1E8DE}) (Version: 1.34 - Avanquest Software)
Belarc Advisor 8.5c (HKLM\...\Belarc Advisor) (Version: 8.5.3.0 - Belarc Inc.)
Bonjour (HKLM\...\{79155F2B-9895-49D7-8612-D92580E0DE5B}) (Version: 3.0.0.10 - Apple Inc.)
Cisco EAP-FAST Module (HKLM\...\{64BF0187-F3D2-498B-99EA-163AF9AE6EC9}) (Version: 2.2.14 - Cisco Systems, Inc.)
Cisco LEAP Module (HKLM\...\{51C7AD07-C3F6-4635-8E8A-231306D810FE}) (Version: 1.0.19 - Cisco Systems, Inc.)
Cisco PEAP Module (HKLM\...\{ED5776D5-59B4-46B7-AF81-5F2D94D7C640}) (Version: 1.1.6 - Cisco Systems, Inc.)
CPUID CPU-Z 1.82 (HKLM\...\CPUID CPU-Z_is1) (Version: 1.82 - )
EaseUS Partition Master 11.9 (HKLM\...\EaseUS Partition Master_is1) (Version:  - EaseUS)
Epson Software Updater (HKLM\...\{B55DB65D-EF6E-4E04-89D5-B03603BF681B}) (Version: 4.4.5 - SEIKO EPSON CORPORATION)
EPSON SX535WD Series Printer Uninstall (HKLM\...\EPSON SX535WD Series) (Version:  - SEIKO EPSON Corporation)
Flickr Uploadr for Windows (HKCU\...\FlickrUploadrWindows) (Version: 1.0.1.292 - Flickr)
Free BMP To PDF Converter (HKLM\...\{E6D45571-E9A6-4856-B184-9177B27C70C8}) (Version: 1.0.0 - Free PDF Solutions)
GameShadow (HKLM\...\{000A4757-A5A0-4B41-8C78-702E1A4F49ED}) (Version: 2.02.0000 - GameShadow Ltd)
Glary Utilities 5.91 (HKLM\...\Glary Utilities 5) (Version: 5.91.0.112 - Glarysoft Ltd)
Google Chrome (HKLM\...\Google Chrome) (Version: 63.0.3239.132 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM\...\{18455581-E099-4BA8-BC6B-F34B2F06600C}) (Version: 1.0.0 - Google Inc.) Hidden
Google Toolbar for Internet Explorer (HKLM\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.8231.2252 - Google Inc.)
Google Update Helper (HKLM\...\{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}) (Version: 1.3.33.7 - Google Inc.) Hidden
Google Update Helper (HKLM\...\{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}) (Version: 1.3.24.15 - Google Inc.) Hidden
HPDiagnosticAlert (HKLM\...\{846B5DED-DC8C-4E1A-B5B4-9F5B39A0CACE}) (Version: 1.00.0000 - Microsoft) Hidden
Kindle Previewer 3 (HKCU\...\Kindle Previewer 3) (Version: 3.15.0 - Amazon)
Magical Jelly Bean KeyFinder (HKLM\...\KeyFinder_is1) (Version: 2.0.10.10 - Magical Jelly Bean)
Malware Hunter 1.51.0.481 (HKLM\...\Malware Hunter) (Version: 1.51.0.481 - Glarysoft Ltd)
Malwarebytes version 3.3.1.2183 (HKLM\...\{35065F43-4BB2-439A-BFF7-0F1014F2E0CD}_is1) (Version: 3.3.1.2183 - Malwarebytes)
MergeModule_x86 (HKLM\...\{42251A8D-C4AE-4D3B-8A50-948CB98A0969}) (Version: 10.5.00 - Sony Corporation) Hidden
Microsoft OneDrive (HKCU\...\OneDriveSetup.exe) (Version: 17.3.7131.1115 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319 (HKLM\...\{196BB40D-1578-3D01-B289-BEFC77A11A1E}) (Version: 10.0.30319 - Microsoft Corporation)
Motorola SM56 Speakerphone Modem (HKLM\...\SMSERIAL) (Version: 6.12.25.06 - Motorola Inc)
MSXML 4.0 SP2 (KB954430) (HKLM\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
NVIDIA Drivers (HKLM\...\NVIDIA Drivers) (Version:  - )
OpenOffice 4.1.4 (HKLM\...\{43D0929E-E6D1-40A9-81C5-2073F995A95D}) (Version: 4.14.9788 - Apache Software Foundation)
Photo Transfer App (HKLM\...\{B2BA0991-5060-305E-A4FF-5507CDB1157F}) (Version: 2.7.1 - UNKNOWN) Hidden
Photo Transfer App (HKLM\...\com.erclab.air.phototransferapp) (Version: 2.7.1 - UNKNOWN)
PlayMemories Home (HKLM\...\{D3981248-DBE7-4050-B666-A7FE5AFFC62C}) (Version: 5.5.00.09202 - Sony Corporation)
PMB_ModeEditor (HKLM\...\{E95982CA-945F-41F2-B156-A603897AB242}) (Version: 10.3.00 - Sony Corporation) Hidden
PMB_ServiceUploader (HKLM\...\{7D3A0097-9E0E-4073-801C-295BBDAEAED8}) (Version: 10.5.00 - Sony Corporation) Hidden
Ralink RT2870 Wireless LAN Card (HKLM\...\{28DA7D8B-F9A4-4F18-8AA0-551B1E084D0D}) (Version: 1.5.26.0 - Ralink)
TomTom MyDrive Connect 4.1.6.3253 (HKLM\...\MyDriveConnect) (Version: 4.1.6.3253 - TomTom)
Visual Studio C++ 10.0 Runtime (HKLM\...\{4412F224-3849-4461-A3E9-DEEF8D252790}) (Version: 10.0.0 - TomTom International B.V.)
WD Backup (HKLM\...\{4AACAFC7-951A-4215-B430-3DFCFF2E6CED}) (Version: 1.5.5953.19614 - Western Digital Technologies, Inc) Hidden
WD Backup (HKLM\...\{a8c9535a-ecd9-4172-a330-0cb5ff9dbed9}) (Version: 1.5.5953.19614 - Western Digital Technologies, Inc.)
WD Drive Utilities (HKLM\...\{48996CDD-DD81-4197-93FE-0971E73C5CA7}) (Version: 1.3.2.2 - Western Digital Technologies, Inc.) Hidden
WD Drive Utilities (HKLM\...\{eab1fb93-61fb-48de-b815-b4e9b68d2ef1}) (Version: 1.3.2.2 - Western Digital Technologies, Inc.)
WD Quick View (HKLM\...\{965D28B5-3C86-41FD-994E-D6376815C9B3}) (Version: 2.4.10.17 - Western Digital Technologies, Inc.)
WD Security (HKLM\...\{249644e6-451a-4a5c-bd5c-21eeb9eec79d}) (Version: 1.3.1.2 - Western Digital Technologies, Inc.)
WD Security (HKLM\...\{7CC2EDF2-83EC-4707-BDD3-72469236A6CC}) (Version: 1.3.1.2 - Western Digital Technologies, Inc.) Hidden
Windows 10 Update and Privacy Settings (HKLM\...\{542CC2C2-ABAF-4604-8723-DA296AF74540}) (Version: 1.0.14.0 - Microsoft Corporation)
Windows 10 Upgrade Assistant (HKLM\...\{D5C69738-B486-402E-85AC-2456D98A64E4}) (Version: 1.4.9200.17323 - Microsoft Corporation)
XnView 2.43 (HKLM\...\XnView_is1) (Version: 2.43 - Gougelet Pierre-e)
========================= Memory info: ===================================
Percentage of memory in use: 59%
Total physical RAM: 1790.55 MB
Available physical RAM: 730.19 MB
Total Virtual: 4475.55 MB
Available Virtual: 3281.18 MB
========================= Partitions: =====================================
1 Drive c: () (Fixed) (Total:148.51 GB) (Free:62.85 GB) NTFS
========================= Users: ========================================
User accounts for \\ERIC
Administrator            DefaultAccount           Eric                    
Guest                    WDAGUtilityAccount      

**** End of log ****


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:57 PM

Posted 02 February 2018 - 02:04 PM

Did I miss the ESET report?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Lintle1234

Lintle1234
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 02 February 2018 - 05:56 PM

Its there, but only has four entries. However, when it completed running, Im sure it said five! The MagicalJellyBean I downloaded quite some time ago. It finds the OS key and GlayUtilities is a suite of programs I use to clear temp files and the like. Ironically, the software that has flagged up the infection is Malware Hunter, which is part of the Glary Utilities suite,

Here is the ESET report again.

C:\Program Files\Magical Jelly Bean\keyfinder.exe a variant of Win32/MagicalJellyBean.B potentially unsafe application
C:\Users\Eric\Downloads\Glary_Utilities_v5.90.0.111 (1).exe Win32/UwS.GlaryUtilities.A application
C:\Users\Eric\Downloads\Glary_Utilities_v5.90.0.111.exe Win32/UwS.GlaryUtilities.A application
C:\Users\Eric\Downloads\Glary_Utilities_v5.91.0.112.exe Win32/UwS.GlaryUtilities.A application
Autostart locations a variant of Win32/MagicalJellyBean.B potentially unsafe application

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:57 PM

Posted 03 February 2018 - 09:40 AM

Lets remove all that Adwcleaner found. Restart machine and see.. You can always reinstall the items.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 Lintle1234

Lintle1234
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 04 February 2018 - 07:48 AM

Hi boopme,

 

Before I go any further, can I just make something straight.

The original problem (please see my first post) was that Malware Hunter had flagged up a Trojan Horse infection on my PC. It is called Trojan Horse TR/Rootkit.Gen (one infection) and Trojan Horse TR/Crypt.XPACK.Gen3 (eleven infections). Malware Hunter could not resolve any of these and it later reported more infections, which it also could not remove or quarantine. Most of the so-called infected files were Microsoft OS .exe files.

 

As the scans you have helped me run have not mentioned any of the so-called infections that Malware Hunter 'found', does that mean that I am certainly not infected with this Trojan but, at worst, these PUPs?

 

I will remove these PUPs if you think I should but I do believe  they are innocent.

 

A question concerning removal - they appear to be Registry locations. Am I to locate these registry locations and remove them? I do not feel comfortable doing this! Or is there something else I need to do to rid the PC of these?

 

Many thanks.



#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:57 PM

Posted 04 February 2018 - 02:45 PM

ok do this and we see what to do next.

a6csRll.pngMalwarebytes Anti-Rootkit Beta
  • Download Malwarebytes Anti-Rootkit Beta and extract it to your desktop (MBAR will be launched shortly after the extraction);
    HTCF1SV.png
  • Click on Next, and then on the Update button to let it update its database. Once the database has been successfully updated, click on Next;
    UJCQPAS.png
  • Make sure all the checkboxes are checked, then click on the Scan button, and let it completes its scan (this can take a while);
    v4lJKL5.png
  • Once the scan is done, make sure that every item is checked, and click on the Cleanup button (a reboot might be required);
  • After that (and the reboot, if one was required), go back in the mbar folder and look for a text file called mbar-log-TODAY'S-DATE.txt;
  • Copy/paste the content of that log in your next reply;

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 Lintle1234

Lintle1234
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 05 February 2018 - 09:00 AM

Hi boopme,

 

I ran the Malwarebytes Anti-Rootkit beta. I did need three tries to get it to run due to my Windows Defender Firewall. 

 

There were no malicious items found. Here is the text file produced by it.

 

 

Malwarebytes Anti-Rootkit BETA 1.10.3.1001
www.malwarebytes.org
Database version:
  main:    v2018.02.05.05
  rootkit: v2018.01.23.01
Windows 10 x86 NTFS
Internet Explorer 11.192.16299.0
Eric :: ERIC [administrator]
2/5/2018 1:20:59 PM
mbar-log-2018-02-05 (13-20-59).txt
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled:
Objects scanned: 219294
Time elapsed: 24 minute(s), 14 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
Physical Sectors Detected: 0
(No malicious items detected)
(end)


#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:57 PM

Posted 05 February 2018 - 01:31 PM

Looks clean... If you want a deeper look we can repost.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 Lintle1234

Lintle1234
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 05 February 2018 - 05:04 PM

Yes, I would like to be as sure as possible as it appears that either Malware Hunter is immensely superior at hunting down Malware than the big names like Malwarebytes and ESET etc or, as I suspect, is giving false warnings.

So, yes, I would like to take a deeper look. How do we go about re-posting?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users